Search criteria
33 vulnerabilities found for winroute_firewall by kerio
FKIE_CVE-2007-6385
Vulnerability from fkie_nvd - Published: 2007-12-15 02:46 - Updated: 2025-04-09 00:30
Severity ?
Summary
The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16FE3282-E941-4399-A29E-6AF736499C49",
"versionEndIncluding": "6.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E5A18A-572A-4914-8AC7-AEF02C760574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5158D0-ED2B-4716-8A81-385562566A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C7737-404A-4EB3-9A1B-0091116D8CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A47DCB-50D3-4CC0-874C-39FF8D09B2EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE437407-E9D3-41A7-B5BF-62CD861B3830",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "810364F5-B6FA-47A2-A5DE-F886CEF1ED70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE280A4-C218-4D2F-88E3-718F19F0E4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A591237E-DBA8-42F3-B4A2-BFD537AE0A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC5DAFA-24B9-4C5D-8F7B-9DDDDFAA2342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E56C041A-5D92-4B7F-9962-A083E883EA8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7223D79B-F096-4265-8D80-F5A41E5A1B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9F17CE-B48E-45A2-BFC9-0D27AF032F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D33CD1F-105E-43CC-B135-76E0AC8CACD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95F501CC-BD8E-460F-9251-B492C979676E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B84BE69E-9760-4ABE-A8C6-C96AD4ACB56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD36E240-FDBB-4EB8-B2C2-7B59715EEDF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD7AF9A-54CD-4D15-9D41-D740CC48FF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D7D55B-887B-479D-9067-0CE457C25561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "705BC91B-4583-418D-BF68-B219BC04EB42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1D191B-ACAF-4871-B553-A55F99827EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C7727351-0ED7-45DD-82DE-0FEE92699927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "563E83E1-74C0-4312-A5C5-0223ADE55F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "173804A3-04EE-484B-A0CF-8DFFE060EFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9DC6F1-3DB7-48B3-8202-66450B95C0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8D06E900-7F9A-4BF0-8411-718AEBFCF8AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96A07C4B-8A49-4126-A957-B16B5A79582B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDFD255-A906-4902-9845-C33669CF9795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18D0B5DC-4E24-4BCE-B58B-A1DCE2739E73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA93A50-82A0-4965-A905-42A04DF3F0B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_1:*:*:*:*:*:*:*",
"matchCriteriaId": "15AA2B44-367D-44FE-AC99-EC91D3C59A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_2:*:*:*:*:*:*:*",
"matchCriteriaId": "26BA5725-C0C4-435B-A0CD-3A432CEF36C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E1622AFA-C603-4621-82BA-D6D8041341FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62958722-577C-4AD3-B628-94062AE501AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2863EC80-5D56-4A22-B65B-E6F1474942C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ABCDEBF0-5CFA-448D-9535-1EB610F78EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "676A024F-C2F6-4310-B6E3-9A8B9B8E2AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "70955FDC-9B1F-4E50-A134-C6A956B52D68",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries."
},
{
"lang": "es",
"value": "El servidor proxy en Kerio WinRoute Firewall anterior a 6.4.1 no hace cumplir la autenticaci\u00f3n para p\u00e1ginas HTTPS, lo cual tiene impacto y vectores de ataque desconocidos. NOTA: no est\u00e1 claro si este asunto atraviesa fronteras de privilegios."
}
],
"id": "CVE-2007-6385",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-12-15T02:46:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/42122"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28072"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/26851"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1019095"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/42122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28072"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/26851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019095"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-5420
Vulnerability from fkie_nvd - Published: 2006-10-20 14:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54221EFB-1376-41CC-85D5-F0CA06C838B4",
"versionEndIncluding": "6.2.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E5A18A-572A-4914-8AC7-AEF02C760574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5158D0-ED2B-4716-8A81-385562566A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C7737-404A-4EB3-9A1B-0091116D8CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A47DCB-50D3-4CC0-874C-39FF8D09B2EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE437407-E9D3-41A7-B5BF-62CD861B3830",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "810364F5-B6FA-47A2-A5DE-F886CEF1ED70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE280A4-C218-4D2F-88E3-718F19F0E4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A591237E-DBA8-42F3-B4A2-BFD537AE0A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC5DAFA-24B9-4C5D-8F7B-9DDDDFAA2342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E56C041A-5D92-4B7F-9962-A083E883EA8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7223D79B-F096-4265-8D80-F5A41E5A1B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9F17CE-B48E-45A2-BFC9-0D27AF032F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D33CD1F-105E-43CC-B135-76E0AC8CACD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95F501CC-BD8E-460F-9251-B492C979676E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B84BE69E-9760-4ABE-A8C6-C96AD4ACB56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD36E240-FDBB-4EB8-B2C2-7B59715EEDF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD7AF9A-54CD-4D15-9D41-D740CC48FF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D7D55B-887B-479D-9067-0CE457C25561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "705BC91B-4583-418D-BF68-B219BC04EB42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1D191B-ACAF-4871-B553-A55F99827EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C7727351-0ED7-45DD-82DE-0FEE92699927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "563E83E1-74C0-4312-A5C5-0223ADE55F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "173804A3-04EE-484B-A0CF-8DFFE060EFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9DC6F1-3DB7-48B3-8202-66450B95C0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8D06E900-7F9A-4BF0-8411-718AEBFCF8AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96A07C4B-8A49-4126-A957-B16B5A79582B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDFD255-A906-4902-9845-C33669CF9795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18D0B5DC-4E24-4BCE-B58B-A1DCE2739E73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA93A50-82A0-4965-A905-42A04DF3F0B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_1:*:*:*:*:*:*:*",
"matchCriteriaId": "15AA2B44-367D-44FE-AC99-EC91D3C59A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_2:*:*:*:*:*:*:*",
"matchCriteriaId": "26BA5725-C0C4-435B-A0CD-3A432CEF36C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E1622AFA-C603-4621-82BA-D6D8041341FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62958722-577C-4AD3-B628-94062AE501AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses."
},
{
"lang": "es",
"value": "Kerio WinRoute Firewall 6.2.2 y anteriores permite a un atacante remoto provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de respuestas DNS mal formadas."
}
],
"evaluatorSolution": "Upgrade to 6.2.3",
"id": "CVE-2006-5420",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-10-20T14:07:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/22986"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1017067"
},
{
"source": "cve@mitre.org",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/20584"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/4056"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29629"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/22986"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017067"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/20584"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/4056"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29629"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-2267
Vulnerability from fkie_nvd - Published: 2006-05-09 10:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the "email protocol inspectors," possibly (1) SMTP and (2) POP3.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E5A18A-572A-4914-8AC7-AEF02C760574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5158D0-ED2B-4716-8A81-385562566A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C7737-404A-4EB3-9A1B-0091116D8CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A47DCB-50D3-4CC0-874C-39FF8D09B2EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE437407-E9D3-41A7-B5BF-62CD861B3830",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "810364F5-B6FA-47A2-A5DE-F886CEF1ED70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE280A4-C218-4D2F-88E3-718F19F0E4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A591237E-DBA8-42F3-B4A2-BFD537AE0A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC5DAFA-24B9-4C5D-8F7B-9DDDDFAA2342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E56C041A-5D92-4B7F-9962-A083E883EA8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7223D79B-F096-4265-8D80-F5A41E5A1B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9F17CE-B48E-45A2-BFC9-0D27AF032F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D33CD1F-105E-43CC-B135-76E0AC8CACD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95F501CC-BD8E-460F-9251-B492C979676E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B84BE69E-9760-4ABE-A8C6-C96AD4ACB56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD36E240-FDBB-4EB8-B2C2-7B59715EEDF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD7AF9A-54CD-4D15-9D41-D740CC48FF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D7D55B-887B-479D-9067-0CE457C25561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "705BC91B-4583-418D-BF68-B219BC04EB42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1D191B-ACAF-4871-B553-A55F99827EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C7727351-0ED7-45DD-82DE-0FEE92699927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "563E83E1-74C0-4312-A5C5-0223ADE55F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE72890F-2421-4A6B-A8F1-4325F824A93F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "173804A3-04EE-484B-A0CF-8DFFE060EFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94AF1105-8B53-4EC7-B52A-9344BDC524CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9DC6F1-3DB7-48B3-8202-66450B95C0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8D06E900-7F9A-4BF0-8411-718AEBFCF8AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F7E58F5-627C-40BA-9ACE-0224530D62C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96A07C4B-8A49-4126-A957-B16B5A79582B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDFD255-A906-4902-9845-C33669CF9795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18D0B5DC-4E24-4BCE-B58B-A1DCE2739E73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.3_patch1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D1FFCAD-7AE9-4A85-B22F-116A8E9ED441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA93A50-82A0-4965-A905-42A04DF3F0B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_1:*:*:*:*:*:*:*",
"matchCriteriaId": "15AA2B44-367D-44FE-AC99-EC91D3C59A4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the \"email protocol inspectors,\" possibly (1) SMTP and (2) POP3."
}
],
"evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nKerio, WinRoute Firewall, 6.2.1",
"id": "CVE-2006-2267",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-05-09T10:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/19947"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016032"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/25273"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/25300"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/17859"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/19947"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/25273"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/25300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/17859"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-0335
Vulnerability from fkie_nvd - Published: 2006-01-21 00:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E5A18A-572A-4914-8AC7-AEF02C760574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5158D0-ED2B-4716-8A81-385562566A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C7737-404A-4EB3-9A1B-0091116D8CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A47DCB-50D3-4CC0-874C-39FF8D09B2EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE437407-E9D3-41A7-B5BF-62CD861B3830",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "810364F5-B6FA-47A2-A5DE-F886CEF1ED70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE280A4-C218-4D2F-88E3-718F19F0E4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A591237E-DBA8-42F3-B4A2-BFD537AE0A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC5DAFA-24B9-4C5D-8F7B-9DDDDFAA2342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E56C041A-5D92-4B7F-9962-A083E883EA8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7223D79B-F096-4265-8D80-F5A41E5A1B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9F17CE-B48E-45A2-BFC9-0D27AF032F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D33CD1F-105E-43CC-B135-76E0AC8CACD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95F501CC-BD8E-460F-9251-B492C979676E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B84BE69E-9760-4ABE-A8C6-C96AD4ACB56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD36E240-FDBB-4EB8-B2C2-7B59715EEDF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD7AF9A-54CD-4D15-9D41-D740CC48FF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D7D55B-887B-479D-9067-0CE457C25561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "705BC91B-4583-418D-BF68-B219BC04EB42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1D191B-ACAF-4871-B553-A55F99827EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C7727351-0ED7-45DD-82DE-0FEE92699927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE72890F-2421-4A6B-A8F1-4325F824A93F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "173804A3-04EE-484B-A0CF-8DFFE060EFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94AF1105-8B53-4EC7-B52A-9344BDC524CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9DC6F1-3DB7-48B3-8202-66450B95C0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F7E58F5-627C-40BA-9ACE-0224530D62C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96A07C4B-8A49-4126-A957-B16B5A79582B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDFD255-A906-4902-9845-C33669CF9795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18D0B5DC-4E24-4BCE-B58B-A1DCE2739E73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.3_patch1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D1FFCAD-7AE9-4A85-B22F-116A8E9ED441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA93A50-82A0-4965-A905-42A04DF3F0B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML."
}
],
"id": "CVE-2006-0335",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-01-21T00:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/18542"
},
{
"source": "cve@mitre.org",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.osvdb.org/22631"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/16314"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/0247"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24232"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24233"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/18542"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.osvdb.org/22631"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/16314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/0247"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24232"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24233"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-0336
Vulnerability from fkie_nvd - Published: 2006-01-21 00:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving "browsing the web".
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E5A18A-572A-4914-8AC7-AEF02C760574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5158D0-ED2B-4716-8A81-385562566A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C7737-404A-4EB3-9A1B-0091116D8CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A47DCB-50D3-4CC0-874C-39FF8D09B2EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE437407-E9D3-41A7-B5BF-62CD861B3830",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "810364F5-B6FA-47A2-A5DE-F886CEF1ED70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE280A4-C218-4D2F-88E3-718F19F0E4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A591237E-DBA8-42F3-B4A2-BFD537AE0A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC5DAFA-24B9-4C5D-8F7B-9DDDDFAA2342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E56C041A-5D92-4B7F-9962-A083E883EA8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7223D79B-F096-4265-8D80-F5A41E5A1B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9F17CE-B48E-45A2-BFC9-0D27AF032F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D33CD1F-105E-43CC-B135-76E0AC8CACD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95F501CC-BD8E-460F-9251-B492C979676E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B84BE69E-9760-4ABE-A8C6-C96AD4ACB56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD36E240-FDBB-4EB8-B2C2-7B59715EEDF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD7AF9A-54CD-4D15-9D41-D740CC48FF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D7D55B-887B-479D-9067-0CE457C25561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "705BC91B-4583-418D-BF68-B219BC04EB42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1D191B-ACAF-4871-B553-A55F99827EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C7727351-0ED7-45DD-82DE-0FEE92699927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE72890F-2421-4A6B-A8F1-4325F824A93F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "173804A3-04EE-484B-A0CF-8DFFE060EFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94AF1105-8B53-4EC7-B52A-9344BDC524CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9DC6F1-3DB7-48B3-8202-66450B95C0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F7E58F5-627C-40BA-9ACE-0224530D62C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96A07C4B-8A49-4126-A957-B16B5A79582B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDFD255-A906-4902-9845-C33669CF9795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18D0B5DC-4E24-4BCE-B58B-A1DCE2739E73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.3_patch1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D1FFCAD-7AE9-4A85-B22F-116A8E9ED441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA93A50-82A0-4965-A905-42A04DF3F0B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_1:*:*:*:*:*:*:*",
"matchCriteriaId": "15AA2B44-367D-44FE-AC99-EC91D3C59A4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving \"browsing the web\"."
}
],
"id": "CVE-2006-0336",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-01-21T00:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/18589"
},
{
"source": "cve@mitre.org",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/22631"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/16385"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/0324"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/18589"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/22631"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/16385"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/0324"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-4425
Vulnerability from fkie_nvd - Published: 2005-12-20 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| kerio | winroute_firewall | 6.0 | |
| kerio | winroute_firewall | 6.0.1 | |
| kerio | winroute_firewall | 6.0.2 | |
| kerio | winroute_firewall | 6.0.3 | |
| kerio | winroute_firewall | 6.0.4 | |
| kerio | winroute_firewall | 6.0.5 | |
| kerio | winroute_firewall | 6.0.6 | |
| kerio | winroute_firewall | 6.0.7 | |
| kerio | winroute_firewall | 6.0.8 | |
| kerio | winroute_firewall | 6.0.9 | |
| kerio | winroute_firewall | 6.0.11 | |
| kerio | winroute_firewall | 6.1 | |
| kerio | winroute_firewall | 6.1.1 | |
| kerio | winroute_firewall | 6.1.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "563E83E1-74C0-4312-A5C5-0223ADE55F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "173804A3-04EE-484B-A0CF-8DFFE060EFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9DC6F1-3DB7-48B3-8202-66450B95C0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8D06E900-7F9A-4BF0-8411-718AEBFCF8AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96A07C4B-8A49-4126-A957-B16B5A79582B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDFD255-A906-4902-9845-C33669CF9795",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams."
}
],
"id": "CVE-2005-4425",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-20T11:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17519"
},
{
"source": "cve@mitre.org",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/15387"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2005/2391"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23034"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17519"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/15387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2005/2391"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23034"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-1062
Vulnerability from fkie_nvd - Published: 2005-05-02 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA7CEE3-7D36-4F9D-8AC6-3F4C55D360CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F931B5E-6F02-48F6-8DAB-C0D796DFC2A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B391EF70-D407-4087-96CF-B925CA2799B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "23D64B85-51A2-47BC-94A2-8C9980CC573D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D4AB197E-4F2E-4976-B6F7-17EB8A8BFBB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "658F01AE-C211-473C-BF70-E524E4310F20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1F769FAE-CC31-4C8B-B785-1423DFC2BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7202BC-AD0B-41B1-B7C1-7665498C967B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "38E60288-F9E6-4E7C-9B48-352277A34C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "32087795-35B4-427A-BDAE-F0A217230C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4C04B63F-3715-46F1-917E-5185691BD619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1A9450-D6E7-4D0A-A9BF-E64284D1E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "041B4428-ADC5-4BD2-9F6E-0BE2362FD9B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "8E19F4EE-1567-4CD8-895C-474CE80241AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "19EA5978-64EC-4B54-BC06-20324DB0E6CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F81E1EDB-A491-4BE6-B6DE-1C4A695EE1F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C076C7D-D833-42CF-9FEF-F3654013AB05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB6DB5-851E-4EDF-AC1C-CBA502C6D5A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE72890F-2421-4A6B-A8F1-4325F824A93F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "173804A3-04EE-484B-A0CF-8DFFE060EFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94AF1105-8B53-4EC7-B52A-9344BDC524CF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods."
}
],
"id": "CVE-2005-1062",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-05-02T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://research.tic.udc.es/scg/advisories/20050429-1.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/397221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://research.tic.udc.es/scg/advisories/20050429-1.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/397221"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-1063
Vulnerability from fkie_nvd - Published: 2005-04-29 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| kerio | kerio_mailserver | 6.0 | |
| kerio | kerio_mailserver | 6.0.1 | |
| kerio | kerio_mailserver | 6.0.2 | |
| kerio | kerio_mailserver | 6.0.3 | |
| kerio | kerio_mailserver | 6.0.4 | |
| kerio | kerio_mailserver | 6.0.5 | |
| kerio | personal_firewall | 4.0.6 | |
| kerio | personal_firewall | 4.0.7 | |
| kerio | personal_firewall | 4.0.8 | |
| kerio | personal_firewall | 4.0.9 | |
| kerio | personal_firewall | 4.0.10 | |
| kerio | personal_firewall | 4.0.16 | |
| kerio | personal_firewall | 4.1 | |
| kerio | personal_firewall | 4.1.1 | |
| kerio | personal_firewall | 4.1.2 | |
| kerio | winroute_firewall | 6.0 | |
| kerio | winroute_firewall | 6.0.1 | |
| kerio | winroute_firewall | 6.0.2 | |
| kerio | winroute_firewall | 6.0.3 | |
| kerio | winroute_firewall | 6.0.4 | |
| kerio | winroute_firewall | 6.0.5 | |
| kerio | winroute_firewall | 6.0.6 | |
| kerio | winroute_firewall | 6.0.7 | |
| kerio | winroute_firewall | 6.0.8 | |
| kerio | winroute_firewall | 6.0.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC515E75-119E-4CB9-985E-00E6A9349178",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F931B5E-6F02-48F6-8DAB-C0D796DFC2A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C66920-4A4F-4335-B052-44E1F92F585B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "658F01AE-C211-473C-BF70-E524E4310F20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1F769FAE-CC31-4C8B-B785-1423DFC2BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7202BC-AD0B-41B1-B7C1-7665498C967B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "38E60288-F9E6-4E7C-9B48-352277A34C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "19EA5978-64EC-4B54-BC06-20324DB0E6CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B9D00A-6598-4BC0-B058-7598657274D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C076C7D-D833-42CF-9FEF-F3654013AB05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB6DB5-851E-4EDF-AC1C-CBA502C6D5A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "563E83E1-74C0-4312-A5C5-0223ADE55F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "173804A3-04EE-484B-A0CF-8DFFE060EFA4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to \"compute unexpected conditions\" and \"perform cryptographic operations.\""
}
],
"id": "CVE-2005-1063",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-04-29T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/397220"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/397220"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-1023
Vulnerability from fkie_nvd - Published: 2005-01-10 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| kerio | kerio_mailserver | 6.0.0 | |
| kerio | kerio_mailserver | 6.0.1 | |
| kerio | kerio_mailserver | 6.0.2 | |
| kerio | kerio_mailserver | 6.0.3 | |
| kerio | kerio_mailserver | 6.0.4 | |
| kerio | serverfirewall | 1.0.0 | |
| kerio | winroute_firewall | 6.0.0 | |
| kerio | winroute_firewall | 6.0.1 | |
| kerio | winroute_firewall | 6.0.2 | |
| kerio | winroute_firewall | 6.0.3 | |
| kerio | winroute_firewall | 6.0.4 | |
| kerio | winroute_firewall | 6.0.5 | |
| kerio | winroute_firewall | 6.0.6 | |
| kerio | winroute_firewall | 6.0.7 | |
| kerio | winroute_firewall | 6.0.8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA7CEE3-7D36-4F9D-8AC6-3F4C55D360CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:serverfirewall:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "38642D5D-7875-4D1D-9F99-3E101FC00964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE72890F-2421-4A6B-A8F1-4325F824A93F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration."
},
{
"lang": "es",
"value": "Kerio Winroute Firewall anteriores a 6.0.9, Server Firewall anteriores a 1.0.1, y MailServer anteriores a 6.0.5, cuando se instala en sistemas basados en Windows, no modifica las listas de control de acceso (ACL) de ficheros cr\u00edticos, lo que permite a usuarios locales con privilegios de \"Usuarios Avanzados\" modificar programas, instalar DLLs maliciosas en la carpeta de plug-ins y modificar ficheros XML relacionados con la configuraci\u00f3n."
}
],
"id": "CVE-2004-1023",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-01-10T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=110305387813002\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18471"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=110305387813002\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18471"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-1022
Vulnerability from fkie_nvd - Published: 2005-01-10 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Kerio Winroute Firewall before 6.0.7, ServerFirewall before 1.0.1, and MailServer before 6.0.5 use symmetric encryption for user passwords, which allows attackers to decrypt the user database and obtain the passwords by extracting the secret key from within the software.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7D26DCD-85B0-4908-A414-119862437C28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B58BAF1-CF68-4F8C-8BCD-FF3C015FE72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9C9084-B518-44F2-9F65-032A644FEC61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F55CFA68-E07E-46CE-87F6-00AE9A268CE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "58ECCE69-EAB9-427E-8922-F463E184C9F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20E50A0F-7AFF-4F17-8833-839DDBD538C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9063B23B-E585-41E4-98FF-DF18602C6E6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CB993B9-0CF5-4E71-A612-F3033F4F202B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B079207-FAF3-4FE2-B420-342440958C48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A82C0BC-50D5-4FAC-A654-387B49CB7047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC1748E-32F0-4144-A597-89E8B8705FFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "39C92F3B-23E3-4978-89AA-FC17B8EDF580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1FA201-CBCF-4D61-9848-F661A16EBEF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2154DF-2306-4E8B-B78A-1BF20E697157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79C4389A-4BF4-4C38-8FF5-72B92548EFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "67230E76-2C30-4038-BC5B-BAC02EDDFAC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEA1EB3-5F4F-40D6-833C-225AC348760D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC515E75-119E-4CB9-985E-00E6A9349178",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:serverfirewall:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB482850-6F0E-484A-B7CA-B8CBCBDBBC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E5A18A-572A-4914-8AC7-AEF02C760574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5158D0-ED2B-4716-8A81-385562566A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C7737-404A-4EB3-9A1B-0091116D8CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A47DCB-50D3-4CC0-874C-39FF8D09B2EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE437407-E9D3-41A7-B5BF-62CD861B3830",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "810364F5-B6FA-47A2-A5DE-F886CEF1ED70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE280A4-C218-4D2F-88E3-718F19F0E4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A591237E-DBA8-42F3-B4A2-BFD537AE0A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC5DAFA-24B9-4C5D-8F7B-9DDDDFAA2342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E56C041A-5D92-4B7F-9962-A083E883EA8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7223D79B-F096-4265-8D80-F5A41E5A1B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9F17CE-B48E-45A2-BFC9-0D27AF032F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D33CD1F-105E-43CC-B135-76E0AC8CACD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95F501CC-BD8E-460F-9251-B492C979676E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B84BE69E-9760-4ABE-A8C6-C96AD4ACB56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD36E240-FDBB-4EB8-B2C2-7B59715EEDF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD7AF9A-54CD-4D15-9D41-D740CC48FF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D7D55B-887B-479D-9067-0CE457C25561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "705BC91B-4583-418D-BF68-B219BC04EB42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1D191B-ACAF-4871-B553-A55F99827EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C7727351-0ED7-45DD-82DE-0FEE92699927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "563E83E1-74C0-4312-A5C5-0223ADE55F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kerio Winroute Firewall before 6.0.7, ServerFirewall before 1.0.1, and MailServer before 6.0.5 use symmetric encryption for user passwords, which allows attackers to decrypt the user database and obtain the passwords by extracting the secret key from within the software."
},
{
"lang": "es",
"value": "Kerio Winroute Firewall anteriores a 6.0.7, ServerFirewall anteriores a 1.0.1, y MailServer anteriores a 6.0.5 usan cifrado sim\u00e9trico para contrase\u00f1as de usuario, lo que permite a atacantes descifrar la base de datos de usuarios y obtener las contrase\u00f1as extrayendo la clave secreta del software."
}
],
"id": "CVE-2004-1022",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-01-10T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=110304957607578\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=110304957607578\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18470"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-2483
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss).
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| kerio | winroute_firewall | 6.0 | |
| kerio | winroute_firewall | 6.0.1 | |
| kerio | winroute_firewall | 6.0.2 | |
| kerio | winroute_firewall | 6.0.3 | |
| kerio | winroute_firewall | 6.0.4 | |
| kerio | winroute_firewall | 6.0.5 | |
| kerio | winroute_firewall | 6.0.6 | |
| kerio | winroute_firewall | 6.0.7 | |
| kerio | winroute_firewall | 6.0.8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "563E83E1-74C0-4312-A5C5-0223ADE55F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE079B94-A8C6-41E7-98B1-29A4DE4F66EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94AC89E5-8B9C-4C6B-8976-6A4A6F922858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B99A154-D3C6-4B1C-BEC9-7D1AEAFCAC41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADAAD5F-3286-464E-A309-9454EE9A663F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1437DE-E19A-4C2C-9077-DB1FF48772C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0089BE-856D-4998-BBFE-1F626A43377E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE81F49-05CE-4987-90C0-B6D077B65DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "650E19BC-6545-45E9-BE2B-0900323C80C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss)."
}
],
"id": "CVE-2004-2483",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/13374"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/12293"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/12294"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/11870"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/13374"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/12293"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/12294"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/11870"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2007-6385 (GCVE-0-2007-6385)
Vulnerability from cvelistv5 – Published: 2007-12-15 02:00 – Updated: 2024-08-07 16:02
VLAI?
Summary
The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:02:37.092Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "42122",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/42122"
},
{
"name": "26851",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26851"
},
{
"name": "ADV-2007-4212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-unspecified-security-bypass(39020)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
},
{
"name": "1019095",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019095"
},
{
"name": "28072",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28072"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-12-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "42122",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/42122"
},
{
"name": "26851",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26851"
},
{
"name": "ADV-2007-4212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-unspecified-security-bypass(39020)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
},
{
"name": "1019095",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019095"
},
{
"name": "28072",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28072"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-6385",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "42122",
"refsource": "OSVDB",
"url": "http://osvdb.org/42122"
},
{
"name": "26851",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26851"
},
{
"name": "ADV-2007-4212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-unspecified-security-bypass(39020)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
},
{
"name": "1019095",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019095"
},
{
"name": "28072",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28072"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-6385",
"datePublished": "2007-12-15T02:00:00",
"dateReserved": "2007-12-14T00:00:00",
"dateUpdated": "2024-08-07T16:02:37.092Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5420 (GCVE-0-2006-5420)
Vulnerability from cvelistv5 – Published: 2006-10-20 10:00 – Updated: 2024-08-07 19:48
VLAI?
Summary
Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:48:30.209Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-4056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4056"
},
{
"name": "1017067",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017067"
},
{
"name": "22986",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22986"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-dns-dos(29629)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29629"
},
{
"name": "20584",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/20584"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-10-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-4056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4056"
},
{
"name": "1017067",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017067"
},
{
"name": "22986",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22986"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-dns-dos(29629)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29629"
},
{
"name": "20584",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/20584"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5420",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-4056",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4056"
},
{
"name": "1017067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017067"
},
{
"name": "22986",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22986"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-dns-dos(29629)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29629"
},
{
"name": "20584",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20584"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5420",
"datePublished": "2006-10-20T10:00:00",
"dateReserved": "2006-10-19T00:00:00",
"dateUpdated": "2024-08-07T19:48:30.209Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-2267 (GCVE-0-2006-2267)
Vulnerability from cvelistv5 – Published: 2006-05-09 10:00 – Updated: 2024-08-07 17:43
VLAI?
Summary
Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the "email protocol inspectors," possibly (1) SMTP and (2) POP3.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:43:28.736Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17859",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17859"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "1016032",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016032"
},
{
"name": "kerio-winroute-email-dos(26263)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
},
{
"name": "ADV-2006-1677",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"name": "25273",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25273"
},
{
"name": "19947",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19947"
},
{
"name": "25300",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25300"
},
{
"name": "20060507 Kerio WinRoute Firewall Protocol Inspection Denial",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-05-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the \"email protocol inspectors,\" possibly (1) SMTP and (2) POP3."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17859",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17859"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "1016032",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016032"
},
{
"name": "kerio-winroute-email-dos(26263)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
},
{
"name": "ADV-2006-1677",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"name": "25273",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25273"
},
{
"name": "19947",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19947"
},
{
"name": "25300",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25300"
},
{
"name": "20060507 Kerio WinRoute Firewall Protocol Inspection Denial",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2267",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the \"email protocol inspectors,\" possibly (1) SMTP and (2) POP3."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17859",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17859"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "1016032",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016032"
},
{
"name": "kerio-winroute-email-dos(26263)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
},
{
"name": "ADV-2006-1677",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"name": "25273",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25273"
},
{
"name": "19947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19947"
},
{
"name": "25300",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25300"
},
{
"name": "20060507 Kerio WinRoute Firewall Protocol Inspection Denial",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2267",
"datePublished": "2006-05-09T10:00:00",
"dateReserved": "2006-05-08T00:00:00",
"dateUpdated": "2024-08-07T17:43:28.736Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0335 (GCVE-0-2006-0335)
Vulnerability from cvelistv5 – Published: 2006-01-21 00:00 – Updated: 2024-08-07 16:34
VLAI?
Summary
Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:34:14.747Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "22631",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22631"
},
{
"name": "ADV-2006-0247",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0247"
},
{
"name": "18542",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18542"
},
{
"name": "16314",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16314"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-html-dos(24232)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24232"
},
{
"name": "kerio-winroute-activedirectory-dos(24233)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24233"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-01-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "22631",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22631"
},
{
"name": "ADV-2006-0247",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0247"
},
{
"name": "18542",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18542"
},
{
"name": "16314",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16314"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-html-dos(24232)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24232"
},
{
"name": "kerio-winroute-activedirectory-dos(24233)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24233"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0335",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22631",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22631"
},
{
"name": "ADV-2006-0247",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0247"
},
{
"name": "18542",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18542"
},
{
"name": "16314",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16314"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-html-dos(24232)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24232"
},
{
"name": "kerio-winroute-activedirectory-dos(24233)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24233"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0335",
"datePublished": "2006-01-21T00:00:00",
"dateReserved": "2006-01-20T00:00:00",
"dateUpdated": "2024-08-07T16:34:14.747Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0336 (GCVE-0-2006-0336)
Vulnerability from cvelistv5 – Published: 2006-01-21 00:00 – Updated: 2024-08-07 16:34
VLAI?
Summary
Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving "browsing the web".
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:34:14.495Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "22631",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22631"
},
{
"name": "18589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18589"
},
{
"name": "16385",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16385"
},
{
"name": "ADV-2006-0324",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0324"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-browsing-dos(24317)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-01-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving \"browsing the web\"."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "22631",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22631"
},
{
"name": "18589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18589"
},
{
"name": "16385",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16385"
},
{
"name": "ADV-2006-0324",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0324"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-browsing-dos(24317)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0336",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving \"browsing the web\"."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22631",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22631"
},
{
"name": "18589",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18589"
},
{
"name": "16385",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16385"
},
{
"name": "ADV-2006-0324",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0324"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-browsing-dos(24317)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0336",
"datePublished": "2006-01-21T00:00:00",
"dateReserved": "2006-01-20T00:00:00",
"dateUpdated": "2024-08-07T16:34:14.495Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4425 (GCVE-0-2005-4425)
Vulnerability from cvelistv5 – Published: 2005-12-20 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:46:05.085Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2005-2391",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2391"
},
{
"name": "15387",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15387"
},
{
"name": "17519",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17519"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-rtsp-dos(23034)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23034"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-11-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2005-2391",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2391"
},
{
"name": "15387",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15387"
},
{
"name": "17519",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17519"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-rtsp-dos(23034)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23034"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4425",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2005-2391",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2391"
},
{
"name": "15387",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15387"
},
{
"name": "17519",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17519"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-rtsp-dos(23034)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23034"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4425",
"datePublished": "2005-12-20T11:00:00",
"dateReserved": "2005-12-20T00:00:00",
"dateUpdated": "2024-08-07T23:46:05.085Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2483 (GCVE-0-2004-2483)
Vulnerability from cvelistv5 – Published: 2005-08-21 04:00 – Updated: 2024-08-08 01:29
VLAI?
Summary
Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss).
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:29:13.321Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "kerio-winroute-dns-cache-poisoning(18410)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
},
{
"name": "12293",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/12293"
},
{
"name": "13374",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/13374"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"name": "11870",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/11870"
},
{
"name": "12294",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/12294"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-12-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "kerio-winroute-dns-cache-poisoning(18410)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
},
{
"name": "12293",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/12293"
},
{
"name": "13374",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/13374"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"name": "11870",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/11870"
},
{
"name": "12294",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/12294"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2483",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "kerio-winroute-dns-cache-poisoning(18410)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
},
{
"name": "12293",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/12293"
},
{
"name": "13374",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13374"
},
{
"name": "http://www.kerio.com/security_advisory.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/security_advisory.html"
},
{
"name": "11870",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11870"
},
{
"name": "12294",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/12294"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2483",
"datePublished": "2005-08-21T04:00:00",
"dateReserved": "2005-08-21T00:00:00",
"dateUpdated": "2024-08-08T01:29:13.321Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-1062 (GCVE-0-2005-1062)
Vulnerability from cvelistv5 – Published: 2005-04-29 04:00 – Updated: 2024-08-07 21:35
VLAI?
Summary
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:35:59.962Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://research.tic.udc.es/scg/advisories/20050429-1.txt"
},
{
"name": "20050429 [CAN-2005-1062] Administration protocol abuse allows local/remote password cracking",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/397221"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/security_advisory.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-04-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-05-03T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://research.tic.udc.es/scg/advisories/20050429-1.txt"
},
{
"name": "20050429 [CAN-2005-1062] Administration protocol abuse allows local/remote password cracking",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/397221"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/security_advisory.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-1062",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://research.tic.udc.es/scg/advisories/20050429-1.txt",
"refsource": "MISC",
"url": "http://research.tic.udc.es/scg/advisories/20050429-1.txt"
},
{
"name": "20050429 [CAN-2005-1062] Administration protocol abuse allows local/remote password cracking",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/397221"
},
{
"name": "http://www.kerio.com/security_advisory.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/security_advisory.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-1062",
"datePublished": "2005-04-29T04:00:00",
"dateReserved": "2005-04-12T00:00:00",
"dateUpdated": "2024-08-07T21:35:59.962Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-1063 (GCVE-0-2005-1063)
Vulnerability from cvelistv5 – Published: 2005-04-29 04:00 – Updated: 2024-08-07 21:35
VLAI?
Summary
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:35:59.857Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
},
{
"name": "20050429 [CAN-2005-1063] Administration protocol abuse leads to Service and System Denial of Service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/397220"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/security_advisory.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-04-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to \"compute unexpected conditions\" and \"perform cryptographic operations.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-05-03T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
},
{
"name": "20050429 [CAN-2005-1063] Administration protocol abuse leads to Service and System Denial of Service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/397220"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/security_advisory.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-1063",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to \"compute unexpected conditions\" and \"perform cryptographic operations.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://research.tic.udc.es/scg/advisories/20050429-2.txt",
"refsource": "MISC",
"url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
},
{
"name": "20050429 [CAN-2005-1063] Administration protocol abuse leads to Service and System Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/397220"
},
{
"name": "http://www.kerio.com/security_advisory.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/security_advisory.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-1063",
"datePublished": "2005-04-29T04:00:00",
"dateReserved": "2005-04-12T00:00:00",
"dateUpdated": "2024-08-07T21:35:59.857Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-1023 (GCVE-0-2004-1023)
Vulnerability from cvelistv5 – Published: 2004-12-15 05:00 – Updated: 2024-08-08 00:39
VLAI?
Summary
Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:39:00.575Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "kerio-insecure-permissions(18471)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18471"
},
{
"name": "20041214 [CAN-2004-1023] Insecure default file system permissions on Microsoft versions of Kerio Software",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110305387813002\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-12-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "kerio-insecure-permissions(18471)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18471"
},
{
"name": "20041214 [CAN-2004-1023] Insecure default file system permissions on Microsoft versions of Kerio Software",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110305387813002\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-1023",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "kerio-insecure-permissions(18471)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18471"
},
{
"name": "20041214 [CAN-2004-1023] Insecure default file system permissions on Microsoft versions of Kerio Software",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=110305387813002\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-1023",
"datePublished": "2004-12-15T05:00:00",
"dateReserved": "2004-11-05T00:00:00",
"dateUpdated": "2024-08-08T00:39:00.575Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-6385 (GCVE-0-2007-6385)
Vulnerability from nvd – Published: 2007-12-15 02:00 – Updated: 2024-08-07 16:02
VLAI?
Summary
The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:02:37.092Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "42122",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/42122"
},
{
"name": "26851",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26851"
},
{
"name": "ADV-2007-4212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-unspecified-security-bypass(39020)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
},
{
"name": "1019095",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019095"
},
{
"name": "28072",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28072"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-12-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "42122",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/42122"
},
{
"name": "26851",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26851"
},
{
"name": "ADV-2007-4212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-unspecified-security-bypass(39020)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
},
{
"name": "1019095",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019095"
},
{
"name": "28072",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28072"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-6385",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "42122",
"refsource": "OSVDB",
"url": "http://osvdb.org/42122"
},
{
"name": "26851",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26851"
},
{
"name": "ADV-2007-4212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-unspecified-security-bypass(39020)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
},
{
"name": "1019095",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019095"
},
{
"name": "28072",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28072"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-6385",
"datePublished": "2007-12-15T02:00:00",
"dateReserved": "2007-12-14T00:00:00",
"dateUpdated": "2024-08-07T16:02:37.092Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5420 (GCVE-0-2006-5420)
Vulnerability from nvd – Published: 2006-10-20 10:00 – Updated: 2024-08-07 19:48
VLAI?
Summary
Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:48:30.209Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-4056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4056"
},
{
"name": "1017067",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017067"
},
{
"name": "22986",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22986"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-dns-dos(29629)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29629"
},
{
"name": "20584",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/20584"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-10-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-4056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4056"
},
{
"name": "1017067",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017067"
},
{
"name": "22986",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22986"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-dns-dos(29629)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29629"
},
{
"name": "20584",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/20584"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5420",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio WinRoute Firewall 6.2.2 and earlier allows remote attackers to cause a denial of service (crash) via malformed DNS responses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-4056",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4056"
},
{
"name": "1017067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017067"
},
{
"name": "22986",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22986"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-dns-dos(29629)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29629"
},
{
"name": "20584",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20584"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5420",
"datePublished": "2006-10-20T10:00:00",
"dateReserved": "2006-10-19T00:00:00",
"dateUpdated": "2024-08-07T19:48:30.209Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-2267 (GCVE-0-2006-2267)
Vulnerability from nvd – Published: 2006-05-09 10:00 – Updated: 2024-08-07 17:43
VLAI?
Summary
Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the "email protocol inspectors," possibly (1) SMTP and (2) POP3.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:43:28.736Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17859",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17859"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "1016032",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016032"
},
{
"name": "kerio-winroute-email-dos(26263)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
},
{
"name": "ADV-2006-1677",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"name": "25273",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25273"
},
{
"name": "19947",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19947"
},
{
"name": "25300",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/25300"
},
{
"name": "20060507 Kerio WinRoute Firewall Protocol Inspection Denial",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-05-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the \"email protocol inspectors,\" possibly (1) SMTP and (2) POP3."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17859",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17859"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "1016032",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016032"
},
{
"name": "kerio-winroute-email-dos(26263)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
},
{
"name": "ADV-2006-1677",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"name": "25273",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25273"
},
{
"name": "19947",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19947"
},
{
"name": "25300",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/25300"
},
{
"name": "20060507 Kerio WinRoute Firewall Protocol Inspection Denial",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2267",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the \"email protocol inspectors,\" possibly (1) SMTP and (2) POP3."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17859",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17859"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "1016032",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016032"
},
{
"name": "kerio-winroute-email-dos(26263)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
},
{
"name": "ADV-2006-1677",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"name": "25273",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25273"
},
{
"name": "19947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19947"
},
{
"name": "25300",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25300"
},
{
"name": "20060507 Kerio WinRoute Firewall Protocol Inspection Denial",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2267",
"datePublished": "2006-05-09T10:00:00",
"dateReserved": "2006-05-08T00:00:00",
"dateUpdated": "2024-08-07T17:43:28.736Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0335 (GCVE-0-2006-0335)
Vulnerability from nvd – Published: 2006-01-21 00:00 – Updated: 2024-08-07 16:34
VLAI?
Summary
Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:34:14.747Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "22631",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22631"
},
{
"name": "ADV-2006-0247",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0247"
},
{
"name": "18542",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18542"
},
{
"name": "16314",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16314"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-html-dos(24232)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24232"
},
{
"name": "kerio-winroute-activedirectory-dos(24233)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24233"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-01-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "22631",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22631"
},
{
"name": "ADV-2006-0247",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0247"
},
{
"name": "18542",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18542"
},
{
"name": "16314",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16314"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-html-dos(24232)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24232"
},
{
"name": "kerio-winroute-activedirectory-dos(24233)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24233"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0335",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in Kerio WinRoute Firewall before 6.1.4 Patch 1 allow remote attackers to cause a denial of service via multiple unspecified vectors involving (1) long strings received from Active Directory and (2) the filtering of HTML."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22631",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22631"
},
{
"name": "ADV-2006-0247",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0247"
},
{
"name": "18542",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18542"
},
{
"name": "16314",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16314"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-html-dos(24232)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24232"
},
{
"name": "kerio-winroute-activedirectory-dos(24233)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24233"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0335",
"datePublished": "2006-01-21T00:00:00",
"dateReserved": "2006-01-20T00:00:00",
"dateUpdated": "2024-08-07T16:34:14.747Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0336 (GCVE-0-2006-0336)
Vulnerability from nvd – Published: 2006-01-21 00:00 – Updated: 2024-08-07 16:34
VLAI?
Summary
Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving "browsing the web".
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:34:14.495Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "22631",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22631"
},
{
"name": "18589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18589"
},
{
"name": "16385",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16385"
},
{
"name": "ADV-2006-0324",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0324"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-browsing-dos(24317)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-01-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving \"browsing the web\"."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "22631",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22631"
},
{
"name": "18589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18589"
},
{
"name": "16385",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16385"
},
{
"name": "ADV-2006-0324",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0324"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-browsing-dos(24317)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0336",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving \"browsing the web\"."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22631",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22631"
},
{
"name": "18589",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18589"
},
{
"name": "16385",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16385"
},
{
"name": "ADV-2006-0324",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0324"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-browsing-dos(24317)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0336",
"datePublished": "2006-01-21T00:00:00",
"dateReserved": "2006-01-20T00:00:00",
"dateUpdated": "2024-08-07T16:34:14.495Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4425 (GCVE-0-2005-4425)
Vulnerability from nvd – Published: 2005-12-20 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:46:05.085Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2005-2391",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2391"
},
{
"name": "15387",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15387"
},
{
"name": "17519",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17519"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-rtsp-dos(23034)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23034"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-11-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2005-2391",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2391"
},
{
"name": "15387",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15387"
},
{
"name": "17519",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17519"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-rtsp-dos(23034)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23034"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4425",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2005-2391",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2391"
},
{
"name": "15387",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15387"
},
{
"name": "17519",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17519"
},
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{
"name": "kerio-winroute-rtsp-dos(23034)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23034"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4425",
"datePublished": "2005-12-20T11:00:00",
"dateReserved": "2005-12-20T00:00:00",
"dateUpdated": "2024-08-07T23:46:05.085Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2483 (GCVE-0-2004-2483)
Vulnerability from nvd – Published: 2005-08-21 04:00 – Updated: 2024-08-08 01:29
VLAI?
Summary
Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss).
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:29:13.321Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "kerio-winroute-dns-cache-poisoning(18410)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
},
{
"name": "12293",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/12293"
},
{
"name": "13374",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/13374"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"name": "11870",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/11870"
},
{
"name": "12294",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/12294"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-12-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "kerio-winroute-dns-cache-poisoning(18410)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
},
{
"name": "12293",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/12293"
},
{
"name": "13374",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/13374"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/security_advisory.html"
},
{
"name": "11870",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/11870"
},
{
"name": "12294",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/12294"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2483",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "kerio-winroute-dns-cache-poisoning(18410)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18410"
},
{
"name": "12293",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/12293"
},
{
"name": "13374",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13374"
},
{
"name": "http://www.kerio.com/security_advisory.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/security_advisory.html"
},
{
"name": "11870",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11870"
},
{
"name": "12294",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/12294"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2483",
"datePublished": "2005-08-21T04:00:00",
"dateReserved": "2005-08-21T00:00:00",
"dateUpdated": "2024-08-08T01:29:13.321Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-1062 (GCVE-0-2005-1062)
Vulnerability from nvd – Published: 2005-04-29 04:00 – Updated: 2024-08-07 21:35
VLAI?
Summary
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:35:59.962Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://research.tic.udc.es/scg/advisories/20050429-1.txt"
},
{
"name": "20050429 [CAN-2005-1062] Administration protocol abuse allows local/remote password cracking",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/397221"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/security_advisory.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-04-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-05-03T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://research.tic.udc.es/scg/advisories/20050429-1.txt"
},
{
"name": "20050429 [CAN-2005-1062] Administration protocol abuse allows local/remote password cracking",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/397221"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/security_advisory.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-1062",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://research.tic.udc.es/scg/advisories/20050429-1.txt",
"refsource": "MISC",
"url": "http://research.tic.udc.es/scg/advisories/20050429-1.txt"
},
{
"name": "20050429 [CAN-2005-1062] Administration protocol abuse allows local/remote password cracking",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/397221"
},
{
"name": "http://www.kerio.com/security_advisory.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/security_advisory.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-1062",
"datePublished": "2005-04-29T04:00:00",
"dateReserved": "2005-04-12T00:00:00",
"dateUpdated": "2024-08-07T21:35:59.962Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-1063 (GCVE-0-2005-1063)
Vulnerability from nvd – Published: 2005-04-29 04:00 – Updated: 2024-08-07 21:35
VLAI?
Summary
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:35:59.857Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
},
{
"name": "20050429 [CAN-2005-1063] Administration protocol abuse leads to Service and System Denial of Service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/397220"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kerio.com/security_advisory.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-04-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to \"compute unexpected conditions\" and \"perform cryptographic operations.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-05-03T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
},
{
"name": "20050429 [CAN-2005-1063] Administration protocol abuse leads to Service and System Denial of Service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/397220"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kerio.com/security_advisory.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-1063",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to \"compute unexpected conditions\" and \"perform cryptographic operations.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://research.tic.udc.es/scg/advisories/20050429-2.txt",
"refsource": "MISC",
"url": "http://research.tic.udc.es/scg/advisories/20050429-2.txt"
},
{
"name": "20050429 [CAN-2005-1063] Administration protocol abuse leads to Service and System Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/397220"
},
{
"name": "http://www.kerio.com/security_advisory.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/security_advisory.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-1063",
"datePublished": "2005-04-29T04:00:00",
"dateReserved": "2005-04-12T00:00:00",
"dateUpdated": "2024-08-07T21:35:59.857Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}