5 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Aladdin Knowlege Systems eSafe Gateway 3.5.126.0 does not check the entire stream of Content Vectoring Protocol (CVP) data, which allows remote attackers to bypass virus protection. • http://archives.neohapsis.com/archives/bugtraq/2003-02/0088.html http://www.securityfocus.com/bid/6787 https://exchange.xforce.ibmcloud.com/vulnerabilities/11295 • CWE-16: Configuration •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Aladdin eSafe Gateway versions 3.0 and earlier allows a remote attacker to circumvent filtering of SCRIPT tags by embedding the scripts within certain HTML tags including (1) onload in the BODY tag, (2) href in the A tag, (3) the BUTTON tag, (4) the INPUT tag, or (5) any other tag in which scripts can be defined. • https://www.exploit-db.com/exploits/20869 http://archives.neohapsis.com/archives/bugtraq/2001-05/0284.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6580 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Aladdin eSafe Gateway versions 3.0 and earlier allows a remote attacker to circumvent HTML SCRIPT filtering via the UNICODE encoding of SCRIPT tags within the HTML document. • https://www.exploit-db.com/exploits/20891 http://archives.neohapsis.com/archives/bugtraq/2001-05/0285.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6580 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Aladdin eSafe Gateway versions 2.x allows a remote attacker to circumvent HTML SCRIPT filtering via a special arrangement of HTML tags which includes SCRIPT tags embedded within other SCRIPT tags. • https://www.exploit-db.com/exploits/20890 http://archives.neohapsis.com/archives/bugtraq/2001-05/0282.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6580 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

The Aladdin Knowledge Systems eToken device allows attackers with physical access to the device to obtain sensitive information without knowing the PIN of the owner by resetting the PIN in the EEPROM. • https://www.exploit-db.com/exploits/19894 http://www.l0pht.com/advisories/etoken-piepa.txt http://www.osvdb.org/3266 http://www.securityfocus.com/bid/1170 •