SurfControl SuperScout only filters packets containing both an HTTP GET request and a Host header, which allows local users to bypass filtering by fragmenting packets so that no packet contains both data elements.
References
Link | Resource |
---|---|
http://securitytracker.com/id?1001801 | |
http://www.kb.cert.org/vuls/id/139315 | US Government Resource |
http://securitytracker.com/id?1001801 | |
http://www.kb.cert.org/vuls/id/139315 | US Government Resource |
Configurations
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://securitytracker.com/id?1001801 - | |
References | () http://www.kb.cert.org/vuls/id/139315 - US Government Resource |
Information
Published : 2002-02-26 05:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1465
Mitre link : CVE-2001-1465
CVE.ORG link : CVE-2001-1465
JSON object : View
Products Affected
surfcontrol
- superscout_web_filter
CWE