Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0220
Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and previous versions allows remote malicious users to execute arbitrary code via a handshake packet.
Kerio Personal Firewall 2 2.1
Kerio Personal Firewall 2 2.1.1
Kerio Personal Firewall 2 2.1.2
Kerio Personal Firewall 2 2.1.3
Kerio Personal Firewall 2 2.1.4
5 EDB exploits
1 Github repository
NA
CVE-2003-0219
Kerio Personal Firewall (KPF) 2.1.4 and previous versions allows remote malicious users to execute administrator commands by sniffing packets from a valid session and replaying them against the remote administration server.
Kerio Personal Firewall 2 2.1
Kerio Personal Firewall 2 2.1.1
Kerio Personal Firewall 2 2.1.2
Kerio Personal Firewall 2 2.1.3
Kerio Personal Firewall 2 2.1.4
NA
CVE-2004-1022
Kerio Winroute Firewall prior to 6.0.7, ServerFirewall prior to 1.0.1, and MailServer prior to 6.0.5 use symmetric encryption for user passwords, which allows malicious users to decrypt the user database and obtain the passwords by extracting the secret key from within the softwa...
Kerio Kerio Mailserver 5.6.4
Kerio Kerio Mailserver 5.6.5
Kerio Kerio Mailserver 5.7.6
Kerio Kerio Mailserver 5.7.7
Kerio Kerio Mailserver 6.0.4
Kerio Serverfirewall 1.0
Kerio Winroute Firewall 5.0.7
Kerio Winroute Firewall 5.0.8
Kerio Winroute Firewall 5.1.5
Kerio Winroute Firewall 5.1.6
Kerio Winroute Firewall 6.0.2
Kerio Winroute Firewall 6.0.3
Kerio Kerio Mailserver 5.0
Kerio Kerio Mailserver 5.1
Kerio Kerio Mailserver 5.7.10
Kerio Kerio Mailserver 5.7.2
Kerio Kerio Mailserver 5.1.1
Kerio Kerio Mailserver 5.6.3
Kerio Kerio Mailserver 5.7.4
Kerio Kerio Mailserver 5.7.5
Kerio Kerio Mailserver 6.0.2
Kerio Kerio Mailserver 6.0.3
NA
CVE-2002-2139
Cisco PIX Firewall 6.0.3 and previous versions, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack.
Cisco Pix Firewall Software 6.1
Cisco Pix Firewall Software 6.1\\(2\\)
Cisco Pix Firewall Software 6.1\\(3\\)
Cisco Pix Firewall Software 6.0
Cisco Pix Firewall Software 6.0\\(2\\)
Cisco Pix Firewall Software 6.0\\(1\\)
Cisco Pix Firewall Software 6.0\\(3\\)
7.2
CVSSv3
CVE-2022-28695
On F5 BIG-IP AFM 16.1.x versions before 16.1.2.2, 15.1.x versions before 15.1.5.1, 14.1.x versions before 14.1.4.6, and 13.1.x versions before 13.1.5, an authenticated attacker with high privileges can upload a maliciously crafted file to the BIG-IP AFM Configuration utility, whi...
F5 Big-ip Advanced Firewall Manager 13.1.0
F5 Big-ip Advanced Firewall Manager 14.1.0
F5 Big-ip Advanced Firewall Manager 15.1.0
F5 Big-ip Advanced Firewall Manager 14.1.4
F5 Big-ip Advanced Firewall Manager 16.1.0
F5 Big-ip Advanced Firewall Manager 17.0.0
F5 Big-ip Advanced Firewall Manager 16.1.2
F5 Big-ip Advanced Firewall Manager 16.1.1
F5 Big-ip Advanced Firewall Manager 15.1.5
F5 Big-ip Advanced Firewall Manager 15.1.4
F5 Big-ip Advanced Firewall Manager 15.1.3
F5 Big-ip Advanced Firewall Manager 15.1.2
F5 Big-ip Advanced Firewall Manager 15.1.1
F5 Big-ip Advanced Firewall Manager 14.1.3
F5 Big-ip Advanced Firewall Manager 14.1.2
F5 Big-ip Advanced Firewall Manager 13.1.5
F5 Big-ip Advanced Firewall Manager 13.1.4
F5 Big-ip Advanced Firewall Manager 13.1.3
F5 Big-ip Advanced Firewall Manager 13.1.1
NA
CVE-2001-1101
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b up to and including 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log'...
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
NA
CVE-2001-1102
Check Point FireWall-1 3.0b up to and including 4.1 for Solaris allows local users to overwrite arbitrary files via a symlink attack on temporary policy files that end in a .cpp extension, which are set world-writable.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
NA
CVE-2002-1535
Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote malicious users to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present.
Symantec Raptor Firewall 6.5.3
Symantec Raptor Firewall 6.5
Symantec Enterprise Firewall 6.5.2
NA
CVE-2000-1037
Check Point Firewall-1 session agent 3.0 up to and including 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote malicious users to determine valid usernames and guess a password via a brute force attack.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
2 EDB exploits
NA
CVE-2000-0181
Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote malicious users to determine the real IP address of the host that is making the connection.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »