Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-6620
Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
NA
CVE-2006-6621
Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Symantec Sygate Personal Firewall 5.6.2808
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
NA
CVE-2006-6623
Sygate Personal Firewall 5.6.2808 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
NA
CVE-2006-4000
Directory traversal vulnerability in cgi-bin/preview_email.cgi in Barracuda Spam Firewall (BSF) 3.3.01.001 up to and including 3.3.03.053 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter.
Barracuda Networks Barracuda Spam Firewall 3.3.01.001
Barracuda Networks Barracuda Spam Firewall 3.3.03.053
Barracuda Networks Barracuda Spam Firewall 3.3.03.055
1 EDB exploit
NA
CVE-2006-4001
Login.pm in Barracuda Spam Firewall (BSF) 3.3.01.001 up to and including 3.3.03.053 contains a hard-coded password for the guest account, which allows remote malicious users to read sensitive information such as e-mail logs, and possibly e-mail contents and the admin password.
Barracuda Networks Barracuda Spam Firewall 3.3.03.053
Barracuda Networks Barracuda Spam Firewall 3.3.03.055
Barracuda Networks Barracuda Spam Firewall 3.3.01.001
NA
CVE-2002-1925
Tiny Personal Firewall 3.0 up to and including 3.0.6 allows remote malicious users to cause a denial of service (crash) by via SYN, UDP, ICMP and TCP portscans when the administrator selects the Log tab of the Personal Firewall Agent module.
Tiny Software Tiny Personal Firewall 3.0
Tiny Software Tiny Personal Firewall 3.0.5
Tiny Software Tiny Personal Firewall 3.0.6
4.8
CVSSv3
CVE-2022-47171
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul C. Schroeder IP Vault – WP Firewall plugin <= 1.1 versions.
Ip Vault - Wp Firewall Project Ip Vault - Wp Firewall
7.5
CVSSv3
CVE-2021-41530
Forcepoint NGFW Engine versions 6.5.11 and previous versions, 6.8.6 and previous versions, and 6.10.0 are vulnerable to TCP reflected amplification vulnerability, if HTTP User Response has been configured.
Forcepoint Next Generation Firewall
Forcepoint Next Generation Firewall 6.10.0
NA
CVE-2007-0962
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 prior to 7.0(4.14) and 7.1 prior to 7.1(2.1), and the FWSM 2.x prior to 2.3(4.12) and 3.x prior to 3.1(3.24), when "inspect http" is enabled, allows remote malicious users to cause a denial of service (device reb...
Cisco Firewall Services Module 2.3
Cisco Firewall Services Module 3.1
Cisco Pix Firewall Software 7.1
Cisco Asa 5500 7.0
Cisco Asa 5500 7.1
Cisco Pix Firewall Software 7.0
NA
CVE-2002-0602
Snapgear Lite+ firewall 1.5.4 and 1.5.3 allows remote malicious users to cause a denial of service (crash) via a large number of connections to (1) the HTTP web management port, or (2) the PPTP port.
Snapgear Snapgear Lite\\+ Firewall 1.5.4
Snapgear Snapgear Lite\\+ Firewall 1.5.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
6
7
8
9
10
NEXT »