Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and previous versions uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
comodo comodo firewall pro |