CVE-2004-1517

Zone Labs IMsecure and IMsecure Pro before 1.5 allow remote attackers to bypass Active Link Filtering via an instant message containing a URL with hex encoded file extensions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zonelabs:imsecure:1.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:zonelabs:imsecure:1.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:zonelabs:imsecure:1.0.2.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://download.zonelabs.com/bin/free/securityAlert/16.html - Patch, Vendor Advisory () http://download.zonelabs.com/bin/free/securityAlert/16.html - Patch, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=110020607924001&w=2 - () http://marc.info/?l=bugtraq&m=110020607924001&w=2 -
References () http://secunia.com/advisories/13169 - Vendor Advisory () http://secunia.com/advisories/13169 - Vendor Advisory
References () http://www.securityfocus.com/bid/11662 - Patch () http://www.securityfocus.com/bid/11662 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18042 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18042 -

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1517

Mitre link : CVE-2004-1517

CVE.ORG link : CVE-2004-1517


JSON object : View

Products Affected

zonelabs

  • imsecure