Page 4 of 18 results (0.001 seconds)

CVSS: 7.8EPSS: 1%CPEs: 7EXPL: 0

Ingate Firewall before 4.3.4 and SIParator before 4.3.4 allows remote attackers to cause a denial of service (kernel deadlock) by sending a SYN packet for a TCP stream, which requires an RST packet in response. • http://secunia.com/advisories/18138 http://www.ingate.com/relnote-434.php http://www.securityfocus.com/bid/16023 http://www.vupen.com/english/advisories/2005/3011 •

CVSS: 4.6EPSS: 1%CPEs: 4EXPL: 0

Ingate Firewall 4.1.3 and earlier does not terminate the PPTP session for an active user when the administrator disables that user from a resource, which could allow remote authenticated users to retain unauthorized access to resources. • http://marc.info/?l=bugtraq&m=110684375429946&w=2 http://secunia.com/advisories/14060 http://securitytracker.com/id?1013022 http://www.ingate.com/relnote-422.php http://www.securityfocus.com/bid/12383 https://exchange.xforce.ibmcloud.com/vulnerabilities/19123 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 1

The Session Initiation Protocol (SIP) implementation in Ingate Firewall and Ingate SIParator before 3.1.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite. • http://www.cert.org/advisories/CA-2003-06.html http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip http://www.kb.cert.org/vuls/id/528719 http://www.securityfocus.com/bid/6904 https://exchange.xforce.ibmcloud.com/vulnerabilities/11379 •