Vulnerabilities > Filseclab > High

DATE CVE VULNERABILITY TITLE RISK
2023-05-24 CVE-2023-2873 Out-of-bounds Write vulnerability in Filseclab Twister Antivirus 8.0/8.17
A vulnerability classified as critical was found in Twister Antivirus 8.
local
low complexity
filseclab CWE-787
7.8
2023-03-17 CVE-2023-1443 Improper Resource Shutdown or Release vulnerability in Filseclab Twister Antivirus 8.0
A vulnerability was found in Filseclab Twister Antivirus 8.
network
low complexity
filseclab CWE-404
7.5
2023-02-24 CVE-2023-1007 Improper Access Control vulnerability in Filseclab Twister Antivirus 8.17
A vulnerability was found in Twister Antivirus 8.17.
local
low complexity
filseclab CWE-284
7.8
2006-12-18 CVE-2006-6623 Sygate Personal Firewall 5.6.2808 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. 7.2
2006-12-18 CVE-2006-6622 Soft4Ever Look 'n' Stop (LnS) 2.05p2 before 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. 7.2
2006-12-18 CVE-2006-6621 Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. 7.2
2006-12-18 CVE-2006-6620 Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. 7.2
2006-12-18 CVE-2006-6619 AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. 7.2
2006-12-18 CVE-2006-6618 AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. 7.2