Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows firewall - vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2006-3697
Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allow...
Agnitum Outpost Firewall 3.51.759.6511
Lavasoft Lavasoft Personal Firewall 1.0.543.5722.433
Novell Client Firewall 2.0
7.5
CVSSv2
CVE-2006-1651
Microsoft ISA Server 2004 allows remote malicious users to bypass certain filtering rules, including ones for (1) ICMP and (2) TCP, via IPv6 packets. NOTE: An established researcher has disputed this issue, saying that "Neither ISA Server 2004 nor Windows 2003 Basic Firewall...
Microsoft Isa Server 2004
2.1
CVSSv2
CVE-2006-1475
Windows Firewall in Microsoft Windows XP SP2 does not produce application alerts when an application is executed using the NTFS Alternate Data Streams (ADS) filename:stream syntax, which might allow local users to launch a Trojan horse attack in which the victim does not obtain t...
Microsoft Windows Xp
2.6
CVSSv2
CVE-2006-1476
Windows Firewall in Microsoft Windows XP SP2 produces incorrect application block alerts when the application filename is ".exe" (with no characters before the "."), which might allow local user-assisted users to trick a user into unblocking a Trojan horse pro...
Microsoft Windows Xp
2.1
CVSSv2
CVE-2005-2765
The user interface in the Windows Firewall does not properly display certain malformed entries in the Windows Registry, which makes it easier for attackers with administrator privileges to hide activities if the administrator only uses the Windows Firewall interface to monitor ex...
Microsoft Windows 2003 Server 64-bit
Microsoft Windows Xp
Microsoft Windows 2003 Server Sp1
5
CVSSv2
CVE-2005-1218
The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote malicious users to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests.
Microsoft Windows Xp
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
1 EDB exploit
1 Github repository
5
CVSSv2
CVE-2005-1649
The IPv6 support in Windows XP SP2, 2003 Server SP1, and Longhorn, with Windows Firewall turned off, allows remote malicious users to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, a variant...
Microsoft Windows Xp
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
1 EDB exploit
5
CVSSv2
CVE-2005-0688
Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote malicious users to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence of the "Land" v...
Microsoft Windows 2003 Server R2
Microsoft Windows Xp
2 EDB exploits
4.6
CVSSv2
CVE-2004-2176
The Internet Connection Firewall (ICF) in Microsoft Windows XP SP2 is configured by default to trust sessmgr.exe, which allows local users to use sessmgr.exe to create a local listening port that bypasses the ICF access controls.
Microsoft Windows Xp
1 EDB exploit
5
CVSSv2
CVE-2004-0230
TCP, when using a large Window Size, makes it easier for remote malicious users to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connection...
Oracle Solaris 11
Oracle Solaris 10
Openpgp Openpgp 2.6.2
Mcafee Network Data Loss Prevention 9.2.0
Mcafee Network Data Loss Prevention
Mcafee Network Data Loss Prevention 9.2.1
Mcafee Network Data Loss Prevention 9.2.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.6.1
Netbsd Netbsd 1.6.2
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 2.0
Xinuos Openserver 5.0.7
Xinuos Openserver 5.0.6
Juniper Junos
Xinuos Unixware 7.1.3
Xinuos Unixware 7.1.1
7 EDB exploits
2 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »