Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-0964
Unknown vulnerability in Kerio Personal Firewall 4.1.2 and previous versions allows local users to bypass firewall rules via a malicious process that impersonates a legitimate process that has fewer restrictions.
Kerio Personal Firewall 4.1
Kerio Personal Firewall 4.1.1
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
Kerio Personal Firewall 4.0.10
Kerio Personal Firewall 4.1.2
Kerio Personal Firewall 4.0.6
Kerio Personal Firewall 4.0.9
NA
CVE-2004-1109
The FWDRV.SYS driver in Kerio Personal Firewall 4.1.1 and previous versions allows remote malicious users to cause a denial of service (CPU consumption and system freeze from infinite loop) via a (1) TCP, (2) UDP, or (3) ICMP packet with a zero length IP Option field.
Kerio Personal Firewall 4.1
Kerio Personal Firewall 4.1.1
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
Kerio Personal Firewall 4.0.10
Kerio Personal Firewall 4.0.6
Kerio Personal Firewall 4.0.9
1 EDB exploit
NA
CVE-2006-4194
Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote malicious users to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: th...
Cisco Pix Firewall 501
Cisco Pix Firewall 515
Cisco Pix Firewall 525
Cisco Pix Firewall 520
Cisco Pix Firewall 515e
Cisco Pix Firewall 535
Cisco Pix Firewall 506
Cisco Pix Firewall Software 6.3
NA
CVE-2005-1063
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote malicious users to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpec...
Kerio Winroute Firewall 6.0.1
Kerio Winroute Firewall 6.0.4
Kerio Winroute Firewall 6.0.3
Kerio Winroute Firewall 6.0.9
Kerio Winroute Firewall 6.0.6
Kerio Personal Firewall 4.1
Kerio Winroute Firewall 6.0
Kerio Personal Firewall 4.1.1
Kerio Winroute Firewall 6.0.5
Kerio Winroute Firewall 6.0.2
Kerio Kerio Mailserver 6.0.4
Kerio Kerio Mailserver 6.0.2
Kerio Winroute Firewall 6.0.8
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
Kerio Personal Firewall 4.0.10
Kerio Winroute Firewall 6.0.7
Kerio Kerio Mailserver 6.0.5
Kerio Personal Firewall 4.1.2
Kerio Kerio Mailserver 6.0
Kerio Kerio Mailserver 6.0.1
NA
CVE-2006-0515
Cisco PIX/ASA 7.1.x prior to 7.1(2) and 7.0.x prior to 7.0(5), PIX 6.3.x prior to 6.3.5(112), and FWSM 2.3.x prior to 2.3(4) and 3.x prior to 3.1(7), when used with Websense/N2H2, allows remote malicious users to bypass HTTP access restrictions by splitting the GET method of an H...
Cisco Adaptive Security Appliance Software 7.0
Cisco Adaptive Security Appliance Software 7.0(4)
Cisco Adaptive Security Appliance Software 7.0.1.4
Cisco Adaptive Security Appliance Software 7.0.4.3
Cisco Pix Firewall 6.2.2.111
Cisco Pix Firewall 6.2.3 (110)
Cisco Pix Firewall 6.3.3 (133)
Cisco Firewall Services Module 2.3
Cisco Firewall Services Module 3.1
Cisco Pix Firewall 6.1.5(104)
Cisco Pix Firewall Software 2.7
Cisco Pix Firewall Software 3.0
Cisco Pix Firewall Software 3.1
Cisco Pix Firewall Software 4.0
Cisco Pix Firewall Software 4.1(6)
Cisco Pix Firewall Software 4.1(6b)
Cisco Pix Firewall Software 4.2
Cisco Pix Firewall Software 4.2(1)
Cisco Pix Firewall Software 4.2(2)
Cisco Pix Firewall Software 4.2(5)
Cisco Pix Firewall Software 4.3
Cisco Pix Firewall Software 4.4
1 EDB exploit
NA
CVE-2010-1329
Imperva SecureSphere Web Application Firewall and Database Firewall 5.0.0.5082 up to and including 7.0.0.7078 allow remote malicious users to bypass intrusion-prevention functionality via a request that has an appended long string containing an unspecified manipulation.
Imperva Securesphere Web Application Firewall 5.0.0.5082
Imperva Securesphere Web Application Firewall 6.2.0.6463
Imperva Securesphere Web Application Firewall 6.0.5.6230
Imperva Securesphere Web Application Firewall 6.0.5.6238
Imperva Securesphere Web Application Firewall 6.2.0.6442
Imperva Securesphere Web Application Firewall 6.0.6.6302
Imperva Securesphere Web Application Firewall 7.0.0.7061
Imperva Securesphere Web Application Firewall 6.0.6.6274
Imperva Securesphere Database Firewall 6.0.5.6238
Imperva Securesphere Database Firewall 7.0.0.7061
Imperva Securesphere Database Firewall 6.0.6.6274
Imperva Securesphere Database Firewall 6.2.0.6463
Imperva Securesphere Database Firewall 6.2.0.6442
Imperva Securesphere Database Firewall 6.0.5.6230
Imperva Securesphere Database Firewall 5.0.0.5082
Imperva Securesphere Database Firewall 6.0.6.6302
Imperva Securesphere Database Firewall 6.0.4.6128
Imperva Securesphere Web Application Firewall 6.0.4.6128
Imperva Securesphere Database Firewall 7.0.0.7078
Imperva Securesphere Web Application Firewall 7.0.0.7078
NA
CVE-2005-1062
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote malicious users to quickly obtain passwords that are 5 characters or less via brute force methods.
Kerio Personal Firewall 4.1.0
Kerio Personal Firewall 4.0.12
Kerio Winroute Firewall 6.0.1
Kerio Winroute Firewall 6.0.4
Kerio Kerio Mailserver 6.0.7
Kerio Winroute Firewall 6.0.3
Kerio Winroute Firewall 6.0.9
Kerio Personal Firewall 4.0.13
Kerio Winroute Firewall 6.0.6
Kerio Kerio Mailserver 6.0.6
Kerio Winroute Firewall 6.0.0
Kerio Personal Firewall 4.0.15
Kerio Personal Firewall 4.1.1
Kerio Winroute Firewall 6.0.5
Kerio Winroute Firewall 6.0.2
Kerio Kerio Mailserver 6.0.8
Kerio Kerio Mailserver 6.0.4
Kerio Kerio Mailserver 6.0.2
Kerio Winroute Firewall 6.0.8
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
NA
CVE-2004-1658
Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
Kerio Personal Firewall 4.0.10
Kerio Personal Firewall 4.0.6
Kerio Personal Firewall 4.0.9
NA
CVE-2006-4312
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable passwor...
Cisco Pix Firewall 501
Cisco Pix Firewall 515
Cisco Pix Firewall 525
Cisco Pix Firewall 520
Cisco Pix Firewall 515e
Cisco Pix Firewall 535
Cisco Pix Firewall 506
Cisco Pix Firewall Software 6.3
Cisco Adaptive Security Appliance
NA
CVE-2002-2140
Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote malicious users to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS.
Cisco Pix Firewall Software 5.2
Cisco Pix Firewall Software 5.2(8)
Cisco Pix Firewall Software 6.0(1)
Cisco Pix Firewall Software 6.0(2)
Cisco Pix Firewall Software 6.2
Cisco Pix Firewall Software 5.2(1)
Cisco Pix Firewall Software 5.2(2)
Cisco Pix Firewall Software 5.2(3)
Cisco Pix Firewall Software 5.2(4)
Cisco Pix Firewall Software 5.2(6)
Cisco Pix Firewall Software 6.0
Cisco Pix Firewall Software 6.0(3)
Cisco Pix Firewall Software 6.1
Cisco Pix Firewall Software 6.1(2)
Cisco Pix Firewall Software 5.2(5)
Cisco Pix Firewall Software 5.2(7)
Cisco Pix Firewall Software 6.1(1)
Cisco Pix Firewall Software 6.1(3)
Cisco Pix Firewall Software 6.2(1)
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »