Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
By Recent Activity
firewall vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1658
Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable....
Kerio Personal Firewall 4.0.7
Kerio Personal Firewall 4.0.8
Kerio Personal Firewall 4.0.10
Kerio Personal Firewall 4.0.16
Kerio Personal Firewall 4.0.6
Kerio Personal Firewall 4.0.9
7.2
CVSSv3
CVE-2022-28695
On F5 BIG-IP AFM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, and 13.1.x versions prior to 13.1.5, an authenticated attacker with high privileges can upload a maliciously crafted file to the BIG-IP AFM Configuration...
F5 Big-ip Advanced Firewall Manager 13.1.0
F5 Big-ip Advanced Firewall Manager 14.1.0
F5 Big-ip Advanced Firewall Manager 15.1.0
F5 Big-ip Advanced Firewall Manager 14.1.4
F5 Big-ip Advanced Firewall Manager 16.1.0
F5 Big-ip Advanced Firewall Manager 17.0.0
F5 Big-ip Advanced Firewall Manager 16.1.2
F5 Big-ip Advanced Firewall Manager 16.1.1
F5 Big-ip Advanced Firewall Manager 15.1.5
F5 Big-ip Advanced Firewall Manager 15.1.4
F5 Big-ip Advanced Firewall Manager 13.1.1
F5 Big-ip Advanced Firewall Manager 13.1.3
F5 Big-ip Advanced Firewall Manager 13.1.4
F5 Big-ip Advanced Firewall Manager 13.1.5
F5 Big-ip Advanced Firewall Manager 14.1.2
F5 Big-ip Advanced Firewall Manager 14.1.3
F5 Big-ip Advanced Firewall Manager 15.1.1
F5 Big-ip Advanced Firewall Manager 15.1.2
F5 Big-ip Advanced Firewall Manager 15.1.3
NA
CVE-2001-1101
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2)...
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
NA
CVE-2000-0813
Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to redirect FTP connections to other servers ("FTP Bounce") via invalid FTP commands that are processed improperly by FireWall-1, aka "FTP Connection Enforcement Bypass."...
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
NA
CVE-2002-1535
Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present....
Symantec Raptor Firewall 6.5.3
Symantec Raptor Firewall 6.5
Symantec Enterprise Firewall 6.5.2
NA
CVE-2000-0809
Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to cause a denial of service....
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
NA
CVE-2000-0806
The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass."...
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
NA
CVE-2004-2483
Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss)....
Kerio Winroute Firewall 6.0.4
Kerio Winroute Firewall 6.0.5
Kerio Winroute Firewall 6.0
Kerio Winroute Firewall 6.0.1
Kerio Winroute Firewall 6.0.6
Kerio Winroute Firewall 6.0.7
Kerio Winroute Firewall 6.0.8
Kerio Winroute Firewall 6.0.2
Kerio Winroute Firewall 6.0.3
NA
CVE-2004-1474
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's...
Symantec Gateway Security 360
Symantec Gateway Security 360r
Symantec Firewall Vpn Appliance 100
Symantec Nexland Pro400 Firewall Appliance
Symantec Nexland Pro800 Firewall Appliance
Symantec Firewall Vpn Appliance 200
Symantec Firewall Vpn Appliance 200r
Symantec Gateway Security 320
Symantec Nexland Pro800turbo Firewall Appliance
Symantec Nexland Wavebase Firewall Appliance
Symantec Nexland Isb Soho Firewall Appliance
Symantec Nexland Pro100 Firewall Appliance
NA
CVE-2003-1004
Cisco PIX firewall 6.2.x through 6.2.3, when configured as a VPN Client, allows remote attackers to cause a denial of service (dropped IPSec tunnel connection) via an IKE Phase I negotiation request to the outside interface of the firewall....
Cisco Pix Firewall 6.2.2 .111
Cisco Pix Firewall Software 6.2
Cisco Pix Firewall Software 6.2\\(1\\)
Cisco Pix Firewall Software 6.2\\(2\\)
Cisco Pix Firewall Software 6.2\\(3\\)
Cisco Pix Firewall Software 6.2\\(3.100\\)
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2022-24025
SSRF
CVE-2022-37451
CVE-2022-24022
CVE-2022-1215
brute force
CVE-2022-29582
CVE-2022-36834
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »