Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-1203
IBM SecureWay Firewall prior to 4.2.2 performs extra processing before determining that a packet is invalid and dropping it, which allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of malformed TCP packets without any flags set.
Ibm Secureway Firewall 4.2
Ibm Secureway Firewall 4.2.1
NA
CVE-2000-1097
The web server for the SonicWALL SOHO firewall allows remote malicious users to cause a denial of service via a long username in the authentication page.
Sonicwall Soho Firewall 4.0.0
Sonicwall Soho Firewall 5.0.0
NA
CVE-2000-1098
The web server for the SonicWALL SOHO firewall allows remote malicious users to cause a denial of service via an empty GET or POST request.
Sonicwall Soho Firewall 5.0.0
Sonicwall Soho Firewall 4.0.0
NA
CVE-2001-0375
Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote malicious users to cause a denial of service via a large number of authentication requests.
Cisco Pix Firewall 515
Cisco Pix Firewall 520
1 EDB exploit
NA
CVE-2000-0582
Check Point FireWall-1 4.0 and 4.1 allows remote malicious users to cause a denial of service by sending a stream of invalid commands (such as binary zeros) to the SMTP Security Server proxy.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
1 EDB exploit
5.4
CVSSv3
CVE-2017-0304
A SQL injection vulnerability exists in the BIG-IP AFM management UI on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the Configuration Utility until there is a resync of the rules. Traffic processing...
F5 Big-ip Advanced Firewall Manager 12.1.1
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager 12.0.0
F5 Big-ip Advanced Firewall Manager 12.1.0
F5 Big-ip Advanced Firewall Manager 12.1.2
NA
CVE-2013-1155
The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 prior to 3.2(20.1), 4.0 prior to 4.0(15.2), and 4.1 prior to 4.1(5.1) allows remote malicious users to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624.
Cisco Firewall Services Module Software 3.2\\(11\\)
Cisco Firewall Services Module Software 3.2\\(10\\)
Cisco Firewall Services Module Software 3.2\\(9\\)
Cisco Firewall Services Module Software 3.2\\(8\\)
Cisco Firewall Services Module Software 4.0\\(4\\)
Cisco Firewall Services Module Software 4.0\\(14\\)
Cisco Firewall Services Module Software 4.0\\(7\\)
Cisco Firewall Services Module Software 4.0\\(6\\)
Cisco Firewall Services Module Software 3.1
Cisco Firewall Services Module Software 3.2\\(18\\)
Cisco Firewall Services Module Software 3.2\\(15\\)
Cisco Firewall Services Module Software 3.2\\(6\\)
Cisco Firewall Services Module Software 3.2\\(5\\)
Cisco Firewall Services Module Software 4.0\\(15\\)
Cisco Firewall Services Module Software 4.0\\(2\\)
Cisco Firewall Services Module Software 4.0\\(8\\)
Cisco Firewall Services Module Software 4.0\\(11\\)
Cisco Firewall Services Module Software 4.0\\(13\\)
Cisco Firewall Services Module Software 4.1\\(4\\)
Cisco Firewall Services Module Software 3.2\\(14\\)
Cisco Firewall Services Module Software 3.2
Cisco Firewall Services Module Software 3.2\\(1\\)
NA
CVE-2006-6619
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Symantec Sygate Personal Firewall 5.6.2808
1 EDB exploit
NA
CVE-2006-6618
AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Avg Antivirus Plus Firewall 7.5.431
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
NA
CVE-2006-6621
Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Symantec Sygate Personal Firewall 5.6.2808
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32744
privilege escalation
CVE-2024-30253
CVE-2024-3914
cross-site scripting
CVE-2024-31497
CVE-2024-3400
CVE-2024-32341
hardcoded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »