Unrated severityNVD Advisory· Published Jul 9, 2001· Updated Apr 16, 2026
CVE-2001-1026
CVE-2001-1026
Description
Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address.
Affected products
1- cpe:2.3:a:trend_micro:interscan_applettrap:2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- archives.neohapsis.com/archives/bugtraq/2001-07/0129.htmlnvdVendor Advisory
- www.securityfocus.com/bid/2996nvd
- www.securityfocus.com/bid/2998nvd
- www.securityfocus.com/bid/3000nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/6816nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/6817nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/6818nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/6819nvd
News mentions
0No linked articles in our index yet.