12 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 46EXPL: 0

15 Dec 2007 — The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries. El servidor proxy en Kerio WinRoute Firewall anterior a 6.4.1 no hace cumplir la autenticación para páginas HTTPS, lo cual tiene impacto y vectores de ataque desconocidos. NOTA: no está claro si este asunto atraviesa fronteras de privilegios. • http://osvdb.org/42122 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 1%CPEs: 42EXPL: 0

20 Oct 2006 — Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses. Kerio WinRoute Firewall 6.2.2 y anteriores permite a un atacante remoto provocar denegación de servicio (caida) a través de respuestas DNS mal formadas. • http://secunia.com/advisories/22986 •

CVSS: 7.5EPSS: 1%CPEs: 42EXPL: 0

09 May 2006 — Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the "email protocol inspectors," possibly (1) SMTP and (2) POP3. • http://secunia.com/advisories/19947 •

CVSS: 7.5EPSS: 1%CPEs: 39EXPL: 0

21 Jan 2006 — Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML. • http://secunia.com/advisories/18542 •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 0

21 Jan 2006 — Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving "browsing the web". • http://secunia.com/advisories/18589 •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

20 Dec 2005 — Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams. • http://secunia.com/advisories/17519 •

CVSS: 9.8EPSS: 1%CPEs: 37EXPL: 0

11 Dec 2005 — Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to authenticate to the service using an account that has been disabled. • http://secunia.com/advisories/17519 •

CVSS: 9.1EPSS: 0%CPEs: 33EXPL: 0

29 Apr 2005 — The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods. • http://research.tic.udc.es/scg/advisories/20050429-1.txt •

CVSS: 7.5EPSS: 0%CPEs: 25EXPL: 0

29 Apr 2005 — The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations." • http://research.tic.udc.es/scg/advisories/20050429-2.txt •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

31 Dec 2004 — Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss). • http://secunia.com/advisories/13374 •