Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kerio personal firewall 4.1.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-0964
Unknown vulnerability in Kerio Personal Firewall 4.1.2 and previous versions allows local users to bypass firewall rules via a malicious process that impersonates a legitimate process that has fewer restrictions.
Kerio Personal Firewall 4.1
Kerio Personal Firewall 4.1.1
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
Kerio Personal Firewall 4.0.10
Kerio Personal Firewall 4.1.2
Kerio Personal Firewall 4.0.6
Kerio Personal Firewall 4.0.9
NA
CVE-2006-5153
The (1) fwdrv.sys and (2) khips.sys drivers in Sunbelt Kerio Personal Firewall 4.3.268 and previous versions do not validate arguments passed through to SSDT functions, including NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile, w...
Kerio Personal Firewall 4.1.0
Kerio Personal Firewall 4.0.12
Kerio Personal Firewall 4.0.13
Kerio Personal Firewall 4.1
Kerio Personal Firewall 4.3.246
Kerio Personal Firewall 4.2
Kerio Personal Firewall 4.0.15
Kerio Personal Firewall 4.1.1
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
Kerio Personal Firewall 4.0.10
Kerio Personal Firewall 4.3.268
Kerio Personal Firewall 4.1.2
Kerio Personal Firewall 4.0.11
Kerio Personal Firewall 4.0.14
Kerio Personal Firewall 4.0.6
Kerio Personal Firewall 4.0.9
NA
CVE-2005-1063
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote malicious users to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpec...
Kerio Winroute Firewall 6.0.1
Kerio Winroute Firewall 6.0.4
Kerio Winroute Firewall 6.0.3
Kerio Winroute Firewall 6.0.9
Kerio Winroute Firewall 6.0.6
Kerio Personal Firewall 4.1
Kerio Winroute Firewall 6.0
Kerio Personal Firewall 4.1.1
Kerio Winroute Firewall 6.0.5
Kerio Winroute Firewall 6.0.2
Kerio Kerio Mailserver 6.0.4
Kerio Kerio Mailserver 6.0.2
Kerio Winroute Firewall 6.0.8
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
Kerio Personal Firewall 4.0.10
Kerio Winroute Firewall 6.0.7
Kerio Kerio Mailserver 6.0.5
Kerio Personal Firewall 4.1.2
Kerio Kerio Mailserver 6.0
Kerio Kerio Mailserver 6.0.1
NA
CVE-2005-1062
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote malicious users to quickly obtain passwords that are 5 characters or less via brute force methods.
Kerio Personal Firewall 4.1.0
Kerio Personal Firewall 4.0.12
Kerio Winroute Firewall 6.0.1
Kerio Winroute Firewall 6.0.4
Kerio Kerio Mailserver 6.0.7
Kerio Winroute Firewall 6.0.3
Kerio Winroute Firewall 6.0.9
Kerio Personal Firewall 4.0.13
Kerio Winroute Firewall 6.0.6
Kerio Kerio Mailserver 6.0.6
Kerio Winroute Firewall 6.0.0
Kerio Personal Firewall 4.0.15
Kerio Personal Firewall 4.1.1
Kerio Winroute Firewall 6.0.5
Kerio Winroute Firewall 6.0.2
Kerio Kerio Mailserver 6.0.8
Kerio Kerio Mailserver 6.0.4
Kerio Kerio Mailserver 6.0.2
Kerio Winroute Firewall 6.0.8
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.16
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started