snort is vulnerable to authorization bypasses. An unauthenticated, remote attacker may exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit allows the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.