Page 4 of 17 results (0.001 seconds)

CVSS: 4.6EPSS: 1%CPEs: 4EXPL: 0

Ingate Firewall 4.1.3 and earlier does not terminate the PPTP session for an active user when the administrator disables that user from a resource, which could allow remote authenticated users to retain unauthorized access to resources. • http://marc.info/?l=bugtraq&m=110684375429946&w=2 http://secunia.com/advisories/14060 http://securitytracker.com/id?1013022 http://www.ingate.com/relnote-422.php http://www.securityfocus.com/bid/12383 https://exchange.xforce.ibmcloud.com/vulnerabilities/19123 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 1

The Session Initiation Protocol (SIP) implementation in Ingate Firewall and Ingate SIParator before 3.1.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite. • http://www.cert.org/advisories/CA-2003-06.html http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip http://www.kb.cert.org/vuls/id/528719 http://www.securityfocus.com/bid/6904 https://exchange.xforce.ibmcloud.com/vulnerabilities/11379 •