CVE-2001-1026
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/07/2001
Last modified:
03/04/2025
Description
Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:trend_micro:interscan_applettrap:2.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0129.html
- http://www.securityfocus.com/bid/2996
- http://www.securityfocus.com/bid/2998
- http://www.securityfocus.com/bid/3000
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6816
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6817
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6818
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6819
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0129.html
- http://www.securityfocus.com/bid/2996
- http://www.securityfocus.com/bid/2998
- http://www.securityfocus.com/bid/3000
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6816
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6817
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6818
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6819