2 results (0.004 seconds)

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 0

Secure Computing Secure Web Gateway (aka Webwasher), when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. Secure Computing Secure Web Gateway (alias Webwasher), cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HTML colocando una cabecera MZ (alias "EXE info") al principio, y modificar el nombre del archivo a (1 ) sin extensión, (2) una extensión. txt, o (3) una extensión .jpg, como lo demuestra un documento que contiene un exploit CVE-2006-5745. • http://securityreason.com/securityalert/4723 http://www.securityfocus.com/archive/1/498995/100/0/threaded http://www.securityfocus.com/archive/1/499043/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 1%CPEs: 2EXPL: 0

Unspecified vulnerability in Secure Computing Webwasher 5.30 before build 3159 and 6.3.0 before build 3150 allows remote attackers to cause a denial of service (freeze) via a crafted URL. Vulnerabilidad no especificada en Secure Computing Webwasher 5.30 versiones anteriores a Build 3159 y 6.3.0 versiones anteriores a Build 3150 permite a atacantes remotos provocar una denegación de servicio (congelación) a través de una URL manipulada. • http://secunia.com/advisories/29674 http://securityreason.com/securityalert/3811 http://www.securityfocus.com/archive/1/490406/100/0/threaded http://www.securityfocus.com/bid/28600 https://exchange.xforce.ibmcloud.com/vulnerabilities/41620 •