CVE-2006-7053

Unspecified vulnerability in Arkoon FAST360 UTM appliances 3.0 through 3.0/29, 3.1, 3.2, and 3.3 allows remote attackers to bypass keyword filtering in the FAST HTTP module, and signatures in the IDPS HTTP module, via crafted URLs that are "misinterpreted."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arkoon:fast360:*:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:3.0:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:3.1:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:3.2:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:24

Type Values Removed Values Added
References () http://secunia.com/advisories/20570 - Patch, Vendor Advisory () http://secunia.com/advisories/20570 - Patch, Vendor Advisory
References () http://www.arkoon.fr/upload/alertes/32AK-2006-01-EN-1.0_EVASION_HTTP.pdf - () http://www.arkoon.fr/upload/alertes/32AK-2006-01-EN-1.0_EVASION_HTTP.pdf -
References () http://www.vupen.com/english/advisories/2006/2216 - () http://www.vupen.com/english/advisories/2006/2216 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27003 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27003 -

Information

Published : 2007-02-24 00:28

Updated : 2024-11-21 00:24


NVD link : CVE-2006-7053

Mitre link : CVE-2006-7053

CVE.ORG link : CVE-2006-7053


JSON object : View

Products Affected

arkoon

  • fast360