8 results (0.030 seconds)

CVSS: 9.3EPSS: 6%CPEs: 1EXPL: 3

Buffer overflow in an ActiveX control in SSHelper.dll for Symantec Sygate Personal Firewall 5.6 build 2808 allows remote attackers to execute arbitrary code via a long third argument to the SetRegString method. Desbordamiento de búfer en el control ActiveX SSHelper.dll para Symantec Sygate Personal Firewall v5.6 build 280, permite a atacantes remotos ejecutar código de su elección a través de un argumento largo al método SetRegString. • https://www.exploit-db.com/exploits/13834 http://osvdb.org/65539 http://www.corelan.be:8800/index.php/forum/security-advisories/10-050-sygate-personal-firewall-5-6-build-2808-activex http://www.exploit-db.com/exploits/13834 https://exchange.xforce.ibmcloud.com/vulnerabilities/59408 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 1

AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. AVG Anti-Virus plus Firewall 7.5.431 depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (1) ImagePathName, (2) CommandLine y(3) WindowTitle en el PEB • https://www.exploit-db.com/exploits/29287 http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php http://www.securityfocus.com/archive/1/454522/100/0/threaded http://www.securityfocus.com/bid/21615 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Soft4Ever Look 'n' Stop (LnS) 2.05p2 before 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. Soft4Ever Look 'n' Stop (LnS) 2.05p2 en versiones anteriores a 20061215 depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (1) ImagePathName, (2) CommandLine y(3) WindowTitle en el PEB. • http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php http://www.securityfocus.com/archive/1/454522/100/0/threaded http://www.securityfocus.com/bid/21615 http://www.wilderssecurity.com/showthread.php?t=158155 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. Comodo Personal Firewall 2.3.6.81 depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (1) ImagePathName, (2) CommandLine y(3) WindowTitle en el PEB. • http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php http://www.securityfocus.com/archive/1/454522/100/0/threaded http://www.securityfocus.com/bid/21615 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. AntiHook 3.0.0.23 - El escritorio depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (1) ImagePathName, (2) CommandLine y(3) WindowTitle en el PEB • http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php http://www.securityfocus.com/archive/1/454522/100/0/threaded http://www.securityfocus.com/bid/21615 •