Filtered by vendor Surfcontrol
Subscribe
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2002-2121 | 1 Surfcontrol | 1 Superscout Email Filter | 2016-10-17 | 5.0 MEDIUM | N/A |
SurfControl SuperScout Email filter for SMTP 3.5.1 allows remote attackers to cause a denial of service (crash) via a long SMTP (1) HELO or (2) RCPT TO command, possibly due to a buffer overflow. | |||||
CVE-2002-0705 | 1 Surfcontrol | 2 Superscout Web Filter, Web Filter | 2016-10-17 | 7.5 HIGH | N/A |
The Web Reports Server for SurfControl SuperScout WebFilter stores the "scwebusers" username and password file in a web-accessible directory, which allows remote attackers to obtain valid usernames and crack the passwords. | |||||
CVE-2002-0706 | 1 Surfcontrol | 2 Superscout Web Filter, Web Filter | 2016-10-17 | 7.5 HIGH | N/A |
UserManager.js in the Web Reports Server for SurfControl SuperScout WebFilter uses weak encryption for administrator functions, which allows remote attackers to decrypt the administrative password using a hard-coded key in a Javascript function. | |||||
CVE-2002-0707 | 1 Surfcontrol | 2 Superscout Web Filter, Web Filter | 2016-10-17 | 5.0 MEDIUM | N/A |
The Web Reports Server for SurfControl SuperScout WebFilter allows remote attackers to cause a denial of service (CPU consumption) via large GET requests, possibly due to a buffer overflow. | |||||
CVE-2002-0708 | 1 Surfcontrol | 2 Superscout Web Filter, Web Filter | 2016-10-17 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the Web Reports Server for SurfControl SuperScout WebFilter allows remote attackers to read arbitrary files via an HTTP request containing ... (triple dot) sequences. | |||||
CVE-2002-0709 | 1 Surfcontrol | 2 Superscout Web Filter, Web Filter | 2016-10-17 | 7.5 HIGH | N/A |
SQL injection vulnerabilities in the Web Reports Server for SurfControl SuperScout WebFilter allow remote attackers to execute arbitrary SQL queries via the RunReport option to SimpleBar.dll, and possibly other DLLs. | |||||
CVE-2000-0124 | 1 Surfcontrol | 1 Superscout | 2008-09-10 | 2.1 LOW | N/A |
surfCONTROL SuperScout does not properly asign a category to web sites with a . (dot) at the end, which may allow users to bypass web access restrictions. | |||||
CVE-2002-1529 | 1 Surfcontrol | 1 Superscout Email Filter | 2008-09-05 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in msgError.asp for the administrative web interface (STEMWADM) for SurfControl SuperScout Email Filter allows remote attackers to insert arbitrary script or HTML via the Reason parameter. | |||||
CVE-2002-1530 | 1 Surfcontrol | 1 Superscout Email Filter | 2008-09-05 | 5.0 MEDIUM | N/A |
The administrative web interface (STEMWADM) for SurfControl SuperScout Email Filter allows users to obtain usernames and plaintext passwords via a request to the userlist.asp program, which includes the passwords in a user editing form. | |||||
CVE-2002-1531 | 1 Surfcontrol | 1 Superscout Email Filter | 2008-09-05 | 5.0 MEDIUM | N/A |
The administrative web interface (STEMWADM) for SurfControl SuperScout Email Filter allows remote attackers to cause a denial of service (crash) via an HTTP request without a Content-Length parameter. | |||||
CVE-2002-1532 | 1 Surfcontrol | 1 Superscout Email Filter | 2008-09-05 | 5.0 MEDIUM | N/A |
The administrative web interface (STEMWADM) for SurfControl SuperScout Email Filter allows remote attackers to cause a denial of service (resource exhaustion) via a GET request without the terminating /r/n/r/n (CRLF) sequence, which causes the interface to wait for the sequence and blocks other users from accessing it. | |||||
CVE-2001-1465 | 1 Surfcontrol | 1 Superscout Web Filter | 2008-09-05 | 4.6 MEDIUM | N/A |
SurfControl SuperScout only filters packets containing both an HTTP GET request and a Host header, which allows local users to bypass filtering by fragmenting packets so that no packet contains both data elements. |