Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and previous versions generates different error messages for invalid usernames versus invalid passwords, which allows remote malicious users to identify valid usernames on the firewall.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
725
VMScore
CVE-2006-6619
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Infoprocess Antihook 3.0.23
Symantec Sygate Personal Firewall 5.6.2808
Filseclab Personal Firewall 3.0.8686
1 EDB exploit
641
VMScore
CVE-2006-6621
Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Infoprocess Antihook 3.0.23
Symantec Sygate Personal Firewall 5.6.2808
Filseclab Personal Firewall 3.0.8686
641
VMScore
CVE-2006-6622
Soft4Ever Look 'n' Stop (LnS) 2.05p2 prior to 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitl...
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Infoprocess Antihook 3.0.23
Symantec Sygate Personal Firewall 5.6.2808
Filseclab Personal Firewall 3.0.8686
641
VMScore
CVE-2006-6620
Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Infoprocess Antihook 3.0.23
Symantec Sygate Personal Firewall 5.6.2808
Filseclab Personal Firewall 3.0.8686
641
VMScore
CVE-2006-6623
Sygate Personal Firewall 5.6.2808 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Infoprocess Antihook 3.0.23
Symantec Sygate Personal Firewall 5.6.2808
Filseclab Personal Firewall 3.0.8686
641
VMScore
CVE-2006-6618
AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Infoprocess Antihook 3.0.23
Symantec Sygate Personal Firewall 5.6.2808
Filseclab Personal Firewall 3.0.8686
405
VMScore
CVE-2006-4000
Directory traversal vulnerability in cgi-bin/preview_email.cgi in Barracuda Spam Firewall (BSF) 3.3.01.001 up to and including 3.3.03.053 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter.
Barracuda Networks Barracuda Spam Firewall 3.3.01.001
Barracuda Networks Barracuda Spam Firewall 3.3.03.055
Barracuda Networks Barracuda Spam Firewall 3.3.03.053
1 EDB exploit
445
VMScore
CVE-2002-1925
Tiny Personal Firewall 3.0 up to and including 3.0.6 allows remote malicious users to cause a denial of service (crash) by via SYN, UDP, ICMP and TCP portscans when the administrator selects the Log tab of the Personal Firewall Agent module.
Tiny Software Tiny Personal Firewall 3.0.6
Tiny Software Tiny Personal Firewall 3.0.5
Tiny Software Tiny Personal Firewall 3.0
668
VMScore
CVE-2006-4001
Login.pm in Barracuda Spam Firewall (BSF) 3.3.01.001 up to and including 3.3.03.053 contains a hard-coded password for the guest account, which allows remote malicious users to read sensitive information such as e-mail logs, and possibly e-mail contents and the admin password.
Barracuda Networks Barracuda Spam Firewall 3.3.01.001
Barracuda Networks Barracuda Spam Firewall 3.3.03.055
Barracuda Networks Barracuda Spam Firewall 3.3.03.053
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »