|ID||CVSS||Summary||Last (major) update||Published|
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestri
|10-10-2017 - 01:29||18-06-2001 - 04:00|
IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the re
|03-04-2009 - 04:00||31-12-2002 - 05:00|
IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file.
|19-12-2017 - 02:29||15-04-1999 - 04:00|
Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions.
|10-10-2017 - 01:29||26-05-2000 - 04:00|
IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs.
|05-09-2008 - 20:28||12-08-2002 - 04:00|
Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL.
|17-08-2017 - 01:30||26-05-2009 - 15:30|