Comodo

Comodo Personal Firewall

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 30.04.2008 00:10:00
  • Last modified 09.04.2025 00:30:58

Comodo Firewall Pro before 3.0 does not properly validate certain parameters to hooked System Service Descriptor Table (SSDT) functions, which allows local users to cause a denial of service (system crash) via (1) a crafted OBJECT_ATTRIBUTES structur...

  • EPSS 0.05%
  • Published 16.05.2007 22:30:00
  • Last modified 09.04.2025 00:30:58

Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81, and probably older Comodo Firewall versions, do not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greate...

  • EPSS 0.04%
  • Published 16.05.2007 22:30:00
  • Last modified 09.04.2025 00:30:58

Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass fire...

  • EPSS 0.06%
  • Published 18.12.2006 11:28:00
  • Last modified 09.04.2025 00:30:58

AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in ...

  • EPSS 0.16%
  • Published 18.12.2006 11:28:00
  • Last modified 09.04.2025 00:30:58

AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle f...

  • EPSS 0.06%
  • Published 18.12.2006 11:28:00
  • Last modified 09.04.2025 00:30:58

Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fiel...

  • EPSS 0.06%
  • Published 18.12.2006 11:28:00
  • Last modified 09.04.2025 00:30:58

Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle...

  • EPSS 0.06%
  • Published 18.12.2006 11:28:00
  • Last modified 09.04.2025 00:30:58

Soft4Ever Look 'n' Stop (LnS) 2.05p2 before 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (...

  • EPSS 0.06%
  • Published 18.12.2006 11:28:00
  • Last modified 09.04.2025 00:30:58

Sygate Personal Firewall 5.6.2808 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fiel...