Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2000-0894
HTTP server on the WatchGuard SOHO firewall does not properly restrict access to administrative functions such as password resets or rebooting, which allows malicious users to cause a denial of service or conduct unauthorized activities.
Watchguard Soho Firewall 1.6
Watchguard Soho Firewall 2.1.3
10
CVSSv2
CVE-2000-0895
Buffer overflow in HTTP server on the WatchGuard SOHO firewall allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long GET request.
Watchguard Soho Firewall 1.6
Watchguard Soho Firewall 2.1.3
5
CVSSv2
CVE-2000-0482
Check Point Firewall-1 allows remote malicious users to cause a denial of service by sending a large number of malformed fragmented IP packets.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
1 EDB exploit
2.1
CVSSv2
CVE-1999-0770
Firewall-1 sets a long timeout for connections that begin with ACK or other packets except SYN, allowing an malicious user to conduct a denial of service via a large number of connection attempts to unresponsive systems.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 3.0
1 EDB exploit
5
CVSSv2
CVE-2001-1303
The default configuration of SecuRemote for Check Point Firewall-1 allows remote malicious users to obtain sensitive configuration information for the protected network without authentication.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
1 EDB exploit
5.5
CVSSv2
CVE-2017-0304
A SQL injection vulnerability exists in the BIG-IP AFM management UI on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the Configuration Utility until there is a resync of the rules. Traffic processing...
F5 Big-ip Advanced Firewall Manager 12.1.1
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager 12.0.0
F5 Big-ip Advanced Firewall Manager 12.1.0
F5 Big-ip Advanced Firewall Manager 12.1.2
7.8
CVSSv2
CVE-2013-1155
The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 prior to 3.2(20.1), 4.0 prior to 4.0(15.2), and 4.1 prior to 4.1(5.1) allows remote malicious users to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624.
Cisco Firewall Services Module Software 3.2\\(11\\)
Cisco Firewall Services Module Software 3.2\\(10\\)
Cisco Firewall Services Module Software 3.2\\(9\\)
Cisco Firewall Services Module Software 3.2\\(8\\)
Cisco Firewall Services Module Software 4.0\\(4\\)
Cisco Firewall Services Module Software 4.0\\(14\\)
Cisco Firewall Services Module Software 4.0\\(7\\)
Cisco Firewall Services Module Software 4.0\\(6\\)
Cisco Firewall Services Module Software 3.1
Cisco Firewall Services Module Software 3.2\\(18\\)
Cisco Firewall Services Module Software 3.2\\(15\\)
Cisco Firewall Services Module Software 3.2\\(6\\)
Cisco Firewall Services Module Software 3.2\\(5\\)
Cisco Firewall Services Module Software 4.0\\(15\\)
Cisco Firewall Services Module Software 4.0\\(2\\)
Cisco Firewall Services Module Software 4.0\\(8\\)
Cisco Firewall Services Module Software 4.0\\(11\\)
Cisco Firewall Services Module Software 4.0\\(13\\)
Cisco Firewall Services Module Software 4.1\\(4\\)
Cisco Firewall Services Module Software 3.2\\(14\\)
Cisco Firewall Services Module Software 3.2
Cisco Firewall Services Module Software 3.2\\(1\\)
7.2
CVSSv2
CVE-2006-6619
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Symantec Sygate Personal Firewall 5.6.2808
1 EDB exploit
7.2
CVSSv2
CVE-2006-6620
Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
7.2
CVSSv2
CVE-2006-6621
Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Symantec Sygate Personal Firewall 5.6.2808
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »