Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
clearswift mimesweeper for web vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-4526
Clearswift MIMEsweeper For Web (a.k.a. WEBsweeper) 4.0 up to and including 5.1 allows remote malicious users to bypass filtering via a URL that does not include a .exe extension but returns an executable file.
Clearswift Mimesweeper For Web 5.0.4
Clearswift Mimesweeper For Web 5.1
Clearswift Mimesweeper For Web 5.0.3
Clearswift Mimesweeper For Web 5.0.5
Clearswift Mimesweeper For Web 4.0
Clearswift Mimesweeper For Web 5.0.2
Clearswift Mimesweeper For Web 5.0.1
NA
CVE-2004-1715
Directory traversal vulnerability in MIMEsweeper for Web prior to 5.0.4 allows remote attackers or local users to read arbitrary files via "..\\", "..\", and similar dot dot sequences in the URL.
Clearswift Mimesweeper For Web 4.0
Clearswift Mimesweeper For Web 5.0.1
NA
CVE-2006-3522
Cross-site scripting (XSS) vulnerability in Clearswift MIMEsweeper for Web prior to 5.1.15 Hotfix allows remote malicious users to inject arbitrary web script or HTML via the URL, which is reflected back in an error message when trying to access a blocked web site.
Clearswift Mimesweeper For Web
NA
CVE-2006-3523
Clearswift MIMEsweeper for Web prior to 5.1.15 Hotfix allows remote malicious users to cause a denial of service (crash) via an encrypted archived .RAR file, which triggers a scan error and causes the Web Policy Engine service to terminate.
Clearswift Mimesweeper For Web
NA
CVE-2004-2703
Clearswift MIMEsweeper 5.0.5, when it has been upgraded from MAILsweeper for SMTP version 4.3 or MAILsweeper Business Suite I or II, allows remote malicious users to bypass scanning by including encrypted data in a mail message, which causes the message to be marked as "Clea...
Clearswift Mailsweeper Business Suite I
Clearswift Mailsweeper Business Suite Ii
Clearswift Mailsweeper For Smtp 4.3
Clearswift Mimesweeper For Web 5.0.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started