Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2001-1303
The default configuration of SecuRemote for Check Point Firewall-1 allows remote malicious users to obtain sensitive configuration information for the protected network without authentication.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
1 EDB exploit
5
CVSSv2
CVE-2000-1098
The web server for the SonicWALL SOHO firewall allows remote malicious users to cause a denial of service via an empty GET or POST request.
Sonicwall Soho Firewall 5.0.0
Sonicwall Soho Firewall 4.0.0
10
CVSSv2
CVE-2000-0894
HTTP server on the WatchGuard SOHO firewall does not properly restrict access to administrative functions such as password resets or rebooting, which allows malicious users to cause a denial of service or conduct unauthorized activities.
Watchguard Soho Firewall 1.6
Watchguard Soho Firewall 2.1.3
10
CVSSv2
CVE-2000-0895
Buffer overflow in HTTP server on the WatchGuard SOHO firewall allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long GET request.
Watchguard Soho Firewall 1.6
Watchguard Soho Firewall 2.1.3
5
CVSSv2
CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and previous versions generates different error messages for invalid usernames versus invalid passwords, which allows remote malicious users to identify valid usernames on the firewall.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
5.5
CVSSv2
CVE-2017-0304
A SQL injection vulnerability exists in the BIG-IP AFM management UI on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the Configuration Utility until there is a resync of the rules. Traffic processing...
F5 Big-ip Advanced Firewall Manager 12.1.1
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager 12.0.0
F5 Big-ip Advanced Firewall Manager 12.1.0
F5 Big-ip Advanced Firewall Manager 12.1.2
7.8
CVSSv2
CVE-2013-1155
The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 prior to 3.2(20.1), 4.0 prior to 4.0(15.2), and 4.1 prior to 4.1(5.1) allows remote malicious users to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624.
Cisco Firewall Services Module Software 3.2\\(11\\)
Cisco Firewall Services Module Software 3.2\\(10\\)
Cisco Firewall Services Module Software 3.2\\(9\\)
Cisco Firewall Services Module Software 3.2\\(8\\)
Cisco Firewall Services Module Software 4.0\\(4\\)
Cisco Firewall Services Module Software 4.0\\(14\\)
Cisco Firewall Services Module Software 4.0\\(7\\)
Cisco Firewall Services Module Software 4.0\\(6\\)
Cisco Firewall Services Module Software 3.1
Cisco Firewall Services Module Software 3.2\\(18\\)
Cisco Firewall Services Module Software 3.2\\(15\\)
Cisco Firewall Services Module Software 3.2\\(6\\)
Cisco Firewall Services Module Software 3.2\\(5\\)
Cisco Firewall Services Module Software 4.0\\(15\\)
Cisco Firewall Services Module Software 4.0\\(2\\)
Cisco Firewall Services Module Software 4.0\\(8\\)
Cisco Firewall Services Module Software 4.0\\(11\\)
Cisco Firewall Services Module Software 4.0\\(13\\)
Cisco Firewall Services Module Software 4.1\\(4\\)
Cisco Firewall Services Module Software 3.2\\(14\\)
Cisco Firewall Services Module Software 3.2
Cisco Firewall Services Module Software 3.2\\(1\\)
7.2
CVSSv2
CVE-2006-6619
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Symantec Sygate Personal Firewall 5.6.2808
1 EDB exploit
7.2
CVSSv2
CVE-2006-6620
Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
7.2
CVSSv2
CVE-2006-6622
Soft4Ever Look 'n' Stop (LnS) 2.05p2 prior to 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitl...
Avg Antivirus Plus Firewall 7.5.431
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »