Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-1203
IBM SecureWay Firewall prior to 4.2.2 performs extra processing before determining that a packet is invalid and dropping it, which allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of malformed TCP packets without any flags set.
Ibm Secureway Firewall 4.2
Ibm Secureway Firewall 4.2.1
NA
CVE-2000-0482
Check Point Firewall-1 allows remote malicious users to cause a denial of service by sending a large number of malformed fragmented IP packets.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
1 EDB exploit
NA
CVE-2001-1158
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote malicious users to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.1 Build 41439
NA
CVE-2002-2405
Check Point FireWall-1 4.1 and Next Generation (NG), with UserAuth configured to proxy HTTP traffic only, allows remote malicious users to pass unauthorized HTTPS, FTP and possibly other traffic through the firewall.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 Ng
NA
CVE-2003-0757
Check Point FireWall-1 4.0 and 4.1 before SP5 allows remote malicious users to obtain the IP addresses of internal interfaces via certain SecuRemote requests to TCP ports 256 or 264, which leaks the IP addresses in a reply packet.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
1 EDB exploit
5.4
CVSSv3
CVE-2017-0304
A SQL injection vulnerability exists in the BIG-IP AFM management UI on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the Configuration Utility until there is a resync of the rules. Traffic processing...
F5 Big-ip Advanced Firewall Manager 12.1.1
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager 12.0.0
F5 Big-ip Advanced Firewall Manager 12.1.0
F5 Big-ip Advanced Firewall Manager 12.1.2
NA
CVE-2013-1155
The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 prior to 3.2(20.1), 4.0 prior to 4.0(15.2), and 4.1 prior to 4.1(5.1) allows remote malicious users to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624.
Cisco Firewall Services Module Software 3.2\\(11\\)
Cisco Firewall Services Module Software 3.2\\(10\\)
Cisco Firewall Services Module Software 3.2\\(9\\)
Cisco Firewall Services Module Software 3.2\\(8\\)
Cisco Firewall Services Module Software 4.0\\(4\\)
Cisco Firewall Services Module Software 4.0\\(14\\)
Cisco Firewall Services Module Software 4.0\\(7\\)
Cisco Firewall Services Module Software 4.0\\(6\\)
Cisco Firewall Services Module Software 3.1
Cisco Firewall Services Module Software 3.2\\(18\\)
Cisco Firewall Services Module Software 3.2\\(15\\)
Cisco Firewall Services Module Software 3.2\\(6\\)
Cisco Firewall Services Module Software 3.2\\(5\\)
Cisco Firewall Services Module Software 4.0\\(15\\)
Cisco Firewall Services Module Software 4.0\\(2\\)
Cisco Firewall Services Module Software 4.0\\(8\\)
Cisco Firewall Services Module Software 4.0\\(11\\)
Cisco Firewall Services Module Software 4.0\\(13\\)
Cisco Firewall Services Module Software 4.1\\(4\\)
Cisco Firewall Services Module Software 3.2\\(14\\)
Cisco Firewall Services Module Software 3.2
Cisco Firewall Services Module Software 3.2\\(1\\)
NA
CVE-2006-6618
AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Avg Antivirus Plus Firewall 7.5.431
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
NA
CVE-2006-6619
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Symantec Sygate Personal Firewall 5.6.2808
1 EDB exploit
NA
CVE-2006-6620
Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »