Page 2 of 16 results (0.002 seconds)

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

11 Jun 2007 — Unspecified vulnerability in Ingate Firewall and SIParator before 4.5.2 allows remote authenticated users without full privileges to download a Support Report. Vulnerabilidad no especificada en Ingate Firewall y SIParator anterior a 4.5.2 permite a usuarios remotos validados sin tener todos los privilegios, descargar un informe de soporte (Support Report). • http://osvdb.org/36707 •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

11 Jun 2007 — Ingate Firewall and SIParator before 4.5.2 allow remote attackers to bypass SIP authentication via a certain maddr parameter. Ingate Firewall y SIParator anterior a 4.5.2 permite a atacantes remotos evitar la validación SIP a través de ciertos parámetros maddr. • http://osvdb.org/36708 • CWE-287: Improper Authentication •

CVSS: 5.9EPSS: 1%CPEs: 4EXPL: 0

09 Jun 2006 — Ingate Firewall in the SIP module before 4.4.1 and SIParator before 4.4.1, when TLS is enabled or when SSL/TLS is enabled in the web server, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake. • http://secunia.com/advisories/20479 •

CVSS: 6.1EPSS: 0%CPEs: 4EXPL: 0

09 Jun 2006 — Cross-site scripting (XSS) vulnerability in the web interface in Ingate Firewall before 4.4.1 and SIParator before 4.4.1 allows remote attackers to inject arbitrary web script or HTML, and steal cookies, via unspecified vectors related to "XSS exploits" in administrator functionality. • http://secunia.com/advisories/20479 •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

22 Dec 2005 — Ingate Firewall before 4.3.4 and SIParator before 4.3.4 allows remote attackers to cause a denial of service (kernel deadlock) by sending a SYN packet for a TCP stream, which requires an RST packet in response. • http://secunia.com/advisories/18138 •

CVSS: 9.8EPSS: 11%CPEs: 2EXPL: 1

31 Dec 2003 — The Session Initiation Protocol (SIP) implementation in Ingate Firewall and Ingate SIParator before 3.1.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite. • http://www.cert.org/advisories/CA-2003-06.html •