Vulnerabilities > Kerio > Winroute Firewall > 5.0.4
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2007-12-15 | CVE-2007-6385 | Improper Authentication vulnerability in Kerio Winroute Firewall The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. | 2.1 |
2006-10-20 | CVE-2006-5420 | Denial of Service vulnerability in Kerio WinRoute Firewall Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses. | 5.0 |
2006-05-09 | CVE-2006-2267 | Remote Denial of Service vulnerability in Kerio WinRoute Firewall Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the "email protocol inspectors," possibly (1) SMTP and (2) POP3. | 5.0 |
2006-01-21 | CVE-2006-0336 | Denial of Service vulnerability in Kerio WinRoute Firewall Web Browsing Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving "browsing the web". | 5.0 |
2006-01-21 | CVE-2006-0335 | Denial of Service vulnerability in Kerio WinRoute Firewall Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML. | 5.0 |
2005-12-11 | CVE-2005-4157 | Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to authenticate to the service using an account that has been disabled. | 7.5 |
2005-01-10 | CVE-2004-1022 | Unspecified vulnerability in Kerio Mailserver, Serverfirewall and Winroute Firewall Kerio Winroute Firewall before 6.0.7, ServerFirewall before 1.0.1, and MailServer before 6.0.5 use symmetric encryption for user passwords, which allows attackers to decrypt the user database and obtain the passwords by extracting the secret key from within the software. | 2.1 |