Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
client firewall vulnerabilities and exploits
(subscribe to this query)
694
VMScore
CVE-2010-0151
The Cisco Firewall Services Module (FWSM) 4.0 prior to 4.0(8), as used in for the Cisco Catalyst 6500 switches, Cisco 7600 routers, and ASA 5500 Adaptive Security Appliances, allows remote malicious users to cause a denial of service (crash) via a malformed Skinny Client Control ...
Cisco Firewall Services Module 4.0
Cisco Firewall Services Module 4.0\\(4\\)
Cisco Firewall Services Module 4.0\\(6\\)
668
VMScore
CVE-2019-6675
BIG-IP configurations using Active Directory, LDAP, or Client Certificate LDAP for management authentication with multiple servers are exposed to a vulnerability which allows an authentication bypass. This can result in a complete compromise of the system. This issue only impacts...
F5 Big-ip Link Controller
F5 Big-ip Link Controller 14.1.0.3.0.79.6-eng Hotfix
F5 Big-ip Link Controller 14.1.0.3.0.97.6-eng Hotfix
F5 Big-ip Link Controller 14.1.0.3.0.99.6-eng Hotfix
F5 Big-ip Link Controller 14.1.0.5.0.15.5-eng Hotfix
F5 Big-ip Link Controller 14.1.0.5.0.36.5-eng Hotfix
F5 Big-ip Link Controller 14.1.0.5.0.40.5-eng Hotfix
F5 Big-ip Link Controller 14.1.0.6.0.11.9-eng Hotfix
F5 Big-ip Link Controller 14.1.0.6.0.14.9-eng Hotfix
F5 Big-ip Link Controller 14.1.0.6.0.68.9-eng Hotfix
F5 Big-ip Link Controller 14.1.0.6.0.70.9-eng Hotfix
F5 Big-ip Link Controller 14.1.2.0.11.37-eng Hotfix
F5 Big-ip Link Controller 14.1.2.0.18.37-eng Hotfix
F5 Big-ip Link Controller 14.1.2.0.32.37-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.46.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.14.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.16.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.34.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.97.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.99.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.105.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.111.4-eng Hotfix
668
VMScore
CVE-2015-7705
The rate limiting feature in NTP 4.x prior to 4.2.8p4 and 4.3.x prior to 4.3.77 allows remote malicious users to have unspecified impact via a large number of crafted requests.
Ntp Ntp
Ntp Ntp 4.2.8
Netapp Oncommand Performance Manager -
Netapp Oncommand Unified Manager -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
Citrix Xenserver 6.0.2
Citrix Xenserver 6.2.0
Citrix Xenserver 6.5
Citrix Xenserver 7.0
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
668
VMScore
CVE-2005-3915
The Internet Key Exchange version 1 (IKEv1) implementation in Clavister Client Web allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the l...
Clavister Clavister Security Gateway 8.40.05
Clavister Clavister Security Gateway 8.50.02
Clavister Clavister Security Gateway 8.60.01 Rc1
Clavister Clavister Firewall 8.30.01
668
VMScore
CVE-2005-2317
Shorewall 2.4.x prior to 2.4.1, 2.2.x prior to 2.2.5, and 2.0.x prior to 2.0.17, when MACLIST_TTL is greater than 0 or MACLIST_DISPOSITION is set to ACCEPT, allows remote attackers with an accepted MAC address to bypass other firewall rules or policies.
Shorewall Shorewall 2.0.14
Shorewall Shorewall 2.0.15
Shorewall Shorewall 2.0.16
Shorewall Shorewall 2.0.2
Shorewall Shorewall 2.0.6
Shorewall Shorewall 2.0.7
Shorewall Shorewall 2.0.8
Shorewall Shorewall 2.0.9
Shorewall Shorewall 2.0.0
Shorewall Shorewall 2.0.0a
Shorewall Shorewall 2.0.0b
Shorewall Shorewall 2.0.2e
Shorewall Shorewall 2.0.2f
Shorewall Shorewall 2.0.3
Shorewall Shorewall 2.0.3a
Shorewall Shorewall 2.4.0
Shorewall Shorewall 2.4.0 Rc1
Shorewall Shorewall 2.4.0 Rc2
Shorewall Shorewall 2.0.10
Shorewall Shorewall 2.0.12
Shorewall Shorewall 2.0.2b
Shorewall Shorewall 2.0.2d
668
VMScore
CVE-2003-0386
OpenSSH 3.6.1 and previous versions, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote malicious users to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose r...
Openbsd Openssh 3.6.1
668
VMScore
CVE-2002-0060
IRC connection tracking helper module in the netfilter subsystem for Linux 2.4.18-pre9 and previous versions does not properly set the mask for conntrack expectations for incoming DCC connections, which could allow remote malicious users to bypass intended firewall restrictions.
Linux Linux Kernel
668
VMScore
CVE-2000-0805
Check Point VPN-1/FireWall-1 4.1 and previous versions improperly retransmits encapsulated FWS packets, even if they do not come from a valid FWZ client, aka "Retransmission of Encapsulated Packets."
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
668
VMScore
CVE-2000-0779
Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote malicious users to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
641
VMScore
CVE-2013-3496
Infotecs ViPNet Client 3.2.10 (15632) and previous versions, ViPNet Coordinator 3.2.10 (15632) and previous versions, ViPNet Personal Firewall 3.1 and previous versions, and ViPNet SafeDisk 4.1 (0.5643) and previous versions use weak permissions (Everyone: Full Control) for a fol...
Infotecs Vipnet Client
Infotecs Vipnet Coordinator
Infotecs Vipnet Personal Firewall
Infotecs Vipnet Safedisk
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »