Page 6 of 44 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 25EXPL: 0

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations." • http://research.tic.udc.es/scg/advisories/20050429-2.txt http://www.kerio.com/security_advisory.html http://www.securityfocus.com/archive/1/397220 •

CVSS: 5.0EPSS: 0%CPEs: 23EXPL: 0

Unknown vulnerability in WebMail in Kerio MailServer before 6.0.9 allows remote attackers to cause a denial of service (CPU consumption) via certain e-mail messages. • http://securitytracker.com/id?1013708 http://www.kerio.com/kms_history.html •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

Unknown vulnerability in Kerio Personal Firewall 4.1.2 and earlier allows local users to bypass firewall rules via a malicious process that impersonates a legitimate process that has fewer restrictions. • http://secunia.com/advisories/14717 http://securitytracker.com/id?1013607 http://www.kerio.com/security_advisory.html#0503 http://www.securityfocus.com/bid/12946 https://exchange.xforce.ibmcloud.com/vulnerabilities/19893 •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in Kerio MailServer before 6.0.3 has unknown impact and unknown remote attack vectors, related to a "potential security issue." • http://secunia.com/advisories/12702 http://www.kerio.com/kms_history.html http://www.securityfocus.com/bid/11300 https://exchange.xforce.ibmcloud.com/vulnerabilities/17601 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

Kerio Personal Firewall (KPF) 2.1.5 allows local users to execute arbitrary code with SYSTEM privileges via the Load button in the Firewall Configuration Files option, which does not drop privileges before opening the file loading dialog box. • http://secunia.com/advisories/10746 http://www.osvdb.org/3748 http://www.securityfocus.com/bid/9525 http://www.securitytracker.com/alerts/2004/Jan/1008870.html http://www.tuneld.com/_images/other/kpf_system_privileges.png http://www.tuneld.com/news/?id=30 https://exchange.xforce.ibmcloud.com/vulnerabilities/14981 •