Baltimore Technologies WEBsweeper 4.0 and 4.02 does not properly filter Javascript from HTML pages, which could allow remote attackers to bypass the filtering via (1) an extra leading < and one or more characters before the SCRIPT tag, or (2) tags using Unicode.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/203821 | Vendor Advisory |
http://www.securityfocus.com/bid/3172 | Vendor Advisory |
http://www.securityfocus.com/bid/3173 | Vendor Advisory |
http://www.securityfocus.com/archive/1/203821 | Vendor Advisory |
http://www.securityfocus.com/bid/3172 | Vendor Advisory |
http://www.securityfocus.com/bid/3173 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/203821 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3172 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3173 - Vendor Advisory |
Information
Published : 2001-08-12 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1157
Mitre link : CVE-2001-1157
CVE.ORG link : CVE-2001-1157
JSON object : View
Products Affected
baltimore_technologies
- websweeper
CWE