Page 4 of 44 results (0.006 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

kpf4ss.exe in Sunbelt Kerio Personal Firewall 4.3.x before 4.3.268 does not properly hook the CreateRemoteThread API function, which allows local users to cause a denial of service (crash) and bypass protection mechanisms by calling CreateRemoteThread. kpf4ss.exe en Sunbelt Kerio Personal Firewall 4.3.x anterior a 4.3.268 no se engancha adecuadamente a la función CreateRemoteThread de la API, lo cual permite a usuarios locales provocar una denegación de servicio (caída) y evitar mecanismos de protección llamando a CreateRemoteThread. • https://www.exploit-db.com/exploits/28228 http://secunia.com/advisories/21060 http://securityreason.com/securityalert/1260 http://www.matousec.com/info/advisories/Kerio-Terminating-kpf4ss-exe-using-internal-runtime-error.php http://www.securityfocus.com/archive/1/440112/100/100/threaded http://www.securityfocus.com/bid/18996 http://www.vupen.com/english/advisories/2006/2828 •

CVSS: 5.0EPSS: 8%CPEs: 42EXPL: 0

Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the "email protocol inspectors," possibly (1) SMTP and (2) POP3. • http://secunia.com/advisories/19947 http://securitytracker.com/id?1016032 http://www.kerio.com/kwf_history.html http://www.osvdb.org/25273 http://www.osvdb.org/25300 http://www.securityfocus.com/archive/1/433585/100/0/threaded http://www.securityfocus.com/bid/17859 http://www.vupen.com/english/advisories/2006/1677 https://exchange.xforce.ibmcloud.com/vulnerabilities/26263 •

CVSS: 6.4EPSS: 0%CPEs: 10EXPL: 0

Unspecified vulnerability in Kerio MailServer before 6.1.4 has unknown impact and remote attack vectors related to a "possible bypass of attachment filter." • http://secunia.com/advisories/19875 http://www.kerio.com/kms_history.html http://www.vupen.com/english/advisories/2006/1610 https://exchange.xforce.ibmcloud.com/vulnerabilities/26170 •

CVSS: 7.8EPSS: 6%CPEs: 24EXPL: 0

Kerio MailServer before 6.1.3 Patch 1 allows remote attackers to cause a denial of service (application crash) via a crafted IMAP LOGIN command. • http://secunia.com/advisories/19150 http://securitytracker.com/id?1015748 http://www.kerio.com/kms_history.html http://www.osvdb.org/23772 http://www.securityfocus.com/archive/1/427471/100/0/threaded http://www.securityfocus.com/bid/17043 http://www.vupen.com/english/advisories/2006/0898 https://exchange.xforce.ibmcloud.com/vulnerabilities/25150 •

CVSS: 5.0EPSS: 0%CPEs: 40EXPL: 0

Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving "browsing the web". • http://secunia.com/advisories/18589 http://www.kerio.com/kwf_history.html http://www.osvdb.org/22631 http://www.securityfocus.com/bid/16385 http://www.vupen.com/english/advisories/2006/0324 https://exchange.xforce.ibmcloud.com/vulnerabilities/24317 •