Firewall Software Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Vendor

Cisco564
F5465
Not Defined184
Palo Alto158
Squid136

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product

F5 BIG-IP329
Cisco ASA267
Palo Alto PAN-OS157
Cisco Firepower Threat Defense128
Fortinet FortiOS98

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix1523
Temporary Fix0
Workaround85
Unavailable0
Not Defined775

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High98
Functional8
Proof-of-Concept419
Unproven111
Not Defined1747

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical3
Local239
Adjacent113
Network2028

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High72
Low641
None1670

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required368
None2015

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤20
≤312
≤4155
≤5287
≤6598
≤7493
≤8593
≤9147
≤1098

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤315
≤4198
≤5405
≤6532
≤7639
≤8401
≤9137
≤1056

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤20
≤329
≤4252
≤5334
≤6690
≤7283
≤8592
≤9107
≤1096

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤31
≤416
≤564
≤6191
≤7179
≤8380
≤9150
≤1096

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤30
≤42
≤57
≤64
≤76
≤85
≤917
≤101

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤52
≤61
≤70
≤82
≤91
≤102

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤71
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k170
<2k349
<5k573
<10k495
<25k602
<50k170
<100k21
≥100k3

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k1682
<2k145
<5k272
<10k170
<25k109
<50k5
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (534): 3proxy, 2345 Security Guard, A10 ACOS Web Application Firewall, acFreeProxy, Agnitum Outpost Firewall, AlgoSec Firewall Analyzer, all-in-one-wp-security-and-firewall Plugin, All In One WP Security , AnalogX Proxy, Anon Proxy Server, apt-www-proxy, Armorlogic Profense Web Application Firewall, Artica Proxy, Artica Proxy CE, Artica Web Proxy, Astaro Firewall, at32 Reverse Proxy, AtGuard Personal Firewall, Avsoft Kerio WinRoute Firewall, Axent Raptor Firewall, Banu Tinyproxy, Barracuda Firewall, Barracuda IMFirewall, Barracuda Spam, Barracuda Spam Firewall, Barracuda Virus Firewall, Barracuda Web Application Firewall, Barracuda Web Application Firewall Online Demo, Barracuda Web Firewall, Barracudanetworks Spam , Barracudanetworks Virus Firewall, Barracuda Networks Barracuda Spam Firewall, Bitly oauth2_proxy, Bluecoat ProxyAV, Bluecoat ProxyClient, Bluecoat Proxysgos, BlueCoat Webproxy, Bluecoat Webproxy, Bluecoat WinProxy, Blue Coat Advanced Secure Gateway, Blue Coat CacheFlow, Blue Coat ProxySG, Borderware Firewall Server, Broadcom ASG, Broadcom ProxySG, BrowserUp Proxy, Bsdperimeter pfSense, BSD Perimeter pfSense, Buzzscripts BuzzyWall, BuzzyWall, C-Note Squid Auth LDAP, CA Personal Firewall, Cerbere Proxy Server, Charles Proxy, Check Point Endpoint Security Client, Check Point Firewall, Check Point Firewall-1, Check point Firewall-1, Check Point Firewall-1 NG, Check Point Firewall-1 PKI Web Service, Check Point FireWall-1 VSX NG, Check Point VPN-1, Check point VPN-1, check point zonealarm, Check Point ZoneAlarm, Check Point ZoneAlarm Extreme Security, Check Point Software Firewall-1, Cisco 1000 Series Integrated Services Router, Cisco 3000 Series Industrial Security Appliance, Cisco 4000 Series Integrated Services Router, Cisco AMP, Cisco AnyConnect Secure Mobility Client, Cisco ASA, Cisco ASA-CX, Cisco ASA-CX Content-Aware Security, Cisco ASAv, Cisco ASA 1000V, Cisco Asa 1000v Cloud Firewall, Cisco ASA 5500, Cisco ASA 5580, Cisco ASA CX, Cisco ASA CX Context-Aware Security, Cisco ASA NGFW, Cisco ASA Software, Cisco Catalyst 8000V Edge Software, Cisco Catalyst 8200 Series Edge Platform, Cisco Catalyst 8300 Series Edge Platform, Cisco Catalyst 8500L Series Edge Platform, Cisco Cisco RV130W Wireless-N Multifunction VPN Router, Cisco Cisco RV215W Wireless-N VPN Router, Cisco Cloud Services Router 1000V Series, Cisco FirePOWER, Cisco Firepower 2100, Cisco Firepower 4100, Cisco Firepower 9000, Cisco Firepower 9300, Cisco Firepower Device Manager, Cisco Firepower Device Manager On-Box, Cisco Firepower Extensible Operating System, Cisco Firepower Management Center, Cisco FirePOWER Management Center, Cisco Firepower Management Center Software, Cisco FirePOWER Services Software for ASA, Cisco Firepower System Software, Cisco Firepower Threat Defense, Cisco Firepower Threat Defense Software, Cisco Firepower User Agent, Cisco Firepower User Agent Software, Cisco FireSIGHT, Cisco FireSIGHT System Software, Cisco Firewall, Cisco Firewall Services Module, Cisco Firewall Services Module Software, Cisco FXOS, Cisco Industrial Security Appliance, Cisco Integrated Services Router, Cisco Integrated Services Virtual Router, Cisco Meraki MX Security Appliance, Cisco NX-OS, Cisco Open Source Snort 2, Cisco PIX, Cisco Pix 500, Cisco PIX 500, Cisco Pix Asa Finesse Operation System, Cisco Pix Firewall, Cisco Pix Firewall 520, Cisco PIX Firewall Manager, Cisco PIX Private Link, Cisco Prime Security Manager, Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, Cisco RV215W Wireless-N VPN Router, Cisco Services Router 1000V, Cisco Snort Detection Engine, Cisco Web Security Appliance, Clavister Eagle E7, Comodo Firewall Pro, Comodo Personal Firewall, Comodo UTM Firewall, Computalynx CProxy, Computalynx CProxy Server, ConfigServer Configserver Security Firewall, CSM Proxy, CUJO Smart Firewall, Daniel Mealha Cabrita Ziproxy, Darold squidclamav, Darold SquidClamav, Delegate Proxy, Dell SonicWall, DELL SonicWALL, Dell SonicWALL GMS, Dell SonicWall GMS Virtual Appliance, Dell SonicWALL NetExtender, Dell Sonicwall Network Security Appliance 2400, Dell SonicWALL Scrutinizer, Dell SonicWall Scrutinizer, Dell Sonicwall Scrutinizer With Flow Analytics Module, Dell SonicWall TotalSecure TZ 100, Dell Sonicwall Universal Management Appliance E5000, Dell SonicWall ViewPoint, Dell UMA, Dell ViewPoint, Deny All Firewall Plugin, dircproxy, dproxy, Dr.Web Firewall, Duo Authentication Proxy, Endian Firewall, Endian Firewall Community, Endian UTM Firewall, ESET Personal Firewall NDIS filter, Extensible Service Proxy, F5 Advanced WAF, F5 ASM, F5 BIG-IP, F5 BIG-IP AAM, F5 BIG-IP Advanced WAF, F5 BIG-IP AFM, F5 BIG-IP Analytics, F5 BIG-IP APM, F5 BIG-IP APM AD, F5 BIG-IP APM Client, F5 BIG-IP APM Clients, F5 BIG-IP APM Client Troubleshooting Utility, F5 BIG-IP APM Edge Client, F5 BIG-IP Application Acceleration Manager, F5 BIG-IP Application Security Manager, F5 BIG-IP ASM, F5 BIG-IP Configuration utility, F5 BIG-IP Controller for Kubernetes, F5 BIG-IP DataSafe, F5 BIG-IP DNS, F5 BIG-IP Edge Client, F5 BIG-IP FPS, F5 BIG-IP GTM, F5 BIG-IP LTM, F5 BIG-IP LTM GSLB, F5 BIG-IP Manager, F5 BIG-IP PEM, F5 Big-IP Protocol Security Manager, F5 Big-ip Protocol Security Module, F5 BIG-IP Virtual Edition, F5 BIG-IP Virtual Server, F5 BIG-IQ, F5 BIG-IQ Centralized Management, F5 BIG-IQ Cloud, F5 Edge Gateway, F5 Enterprise Manager, F5 Firepass, F5 FirePass, F5 iWorkflow, F5 Orchestration, fastify-http-proxy, ffay lanproxy, Firewall, Firewallbuilder fwbuilder, firewalld, Fortech Proxy+, Fortinet FortiGate, Fortinet Fortigate FortiDB, Fortinet Fortinet firewall, Fortinet FortiOS, Fortinet FortiProxy, Fotinet FortiOS, FreeProxy, freeradius3 for pfSense, FreeWeb, Funk Software Proxy, Fwbuilder Firewall Builder, Gaim HTTP Proxy, Gibraltar Gibraltar Firewall, GIPTables GIPTables Firewall, gomeplus-h5-proxy, GreenSQL GreenSQL Firewall, Grok Developments NetProxy, gssproxy, HAProxy, HAProxy Package, HP Praesidium Webproxy, http-proxy.js, Http-proxy, http-proxy-agent, https-proxy-agent, Huawei Honor Cube Wireless Router WS860s Firewall, IBM AIX eNetwork Firewall, IBM AS400 Firewall, IBM Sametime Proxy Server, IBM Secureway Firewall, IBM Secure External Authentication Server, IBM Secure Proxy, Igor Khasilev Oops Proxy Server, Imap Proxy, Imperva SecureSphere Web Application Firewall, Imperva Web Application Firewall, InGate Firewall, Ingate Firewall, ingate firewall, InGate SIParator, Initial Redirect Initial Redirect Squid Proxy Plug-in, Interactive Intelligence Interaction SIP Proxy, Internetnow Proxynow, IPCop Firewall, IPFire Firewall, isomorphic-git cors-proxy, jc21 Nginx Proxy Manager, Juniper NetScreen 5GT Firewall, Kerio Personal Firewall, kerio personal firewall, Kerio Winroute Firewall, Kerio WinRoute Firewall, KingSoft Personal Firewall 9, kube-rbac-proxy, LANCOM R&S Unified Firewall, libproxy, Ln-lab WebProxy, Looknstop Look 'n' Stop Firewall, MapProxy, mastercactapus proxyprotocol, McAfee Client Proxy, McAfee Firewall Reporter, McAfee Personal Firewall Plus, McAfee Unified Threat Management Firewall, McAfee UTM Firewall Appliance, McAfee Web Gateway, Microsoft ISA Proxy, Microsoft ISA Server, Microsoft Personal Firewall, Microsoft Proxy Server, Microsoft Web Proxy, mitmproxy, Multi-Tech Proxyserver, Myproxy, myproxy, my firewall plus, My Firewall Plus, National Science Foundation Squid, National Science Foundation Squid Web Proxy, National Science Foundation Squid Web Proxy Cache, NCSA MyProxy, NetApp SANtricity Storage Manager, NetApp SANtricity Web Services Proxy, NetAsq IPS-Firewall, Netgate pfSense, Netgate pfSense Community Edition, Netgear ProSafe VPN Firewall, Network Associates Gauntlet Firewall, Nokia Firewall Appliance, Nokia IPSO, Nokia IPSO Voyager, Nortel Switched Firewall, Novell Client Firewall, NuFW Firewall, OAuth2-Proxy, OAuth2 Proxy, Octopus Server, Octopus Server Web Request Proxy, Office Efficiencies SafeSquid, Online Armor Personal Firewall, OPNsense, Oracle iPlanet Web Proxy Server, Oracle Sun Java System Web Proxy Server, Oracle Sun Microsystems SunScreen Firewall, Palo-Alto PAN-OS, Palo Alto Firewall, Palo Alto PAN-OS, PAN-OS, ParosProxy, PC Tools Firewall, Pexip Reverse Proxy, Pexip TURN Server, pfSense, pfsense, pfSense Firewall, pfSense Snort package, pfSense Suricata package, phion airlock Web Application Firewall, PHP-Proxy, PHProxy, phpSquidPass, PHP Proxy, Pires go-proxyproto, Privacyware Privatefirewall, ProofPoint Protection Server Email Firewall, Proxomitron Proxy Server, proxy.js, proxy.py, Proxy, Proxy-pro Professional Gatekeeper, ProxyChains-NG, Proxyee-Down, Proxygen, Proxyman, proxystatistics Module, Proxytunnel, proxytunnel, Proxy Anket, PSI GridConnect GmbH IEC104 Security Proxy, PSI GridConnect GmbH Smart Telecontrol Unit, PSI GridConnect GmbH Smart Telecontrol Unit TCG, PSI GridConnect GmbH Telecontrol Gateway, PSI GridConnect GmbH Telecontrol Gateway 3G, PSI GridConnect GmbH Telecontrol Gateway VM, PSI GridConnect GmbH Telecontrol Gateway XS-MU, PSOProxy Server, Pwicorp PrivateFirewall, Qbik WinGate Proxy, QNAP Proxy Server, radsecproxy, RealNetworks RealSystem Proxy, RealNetworks RealSystem Server, Red Hat system-config-firewall, Replicom Proxyview, Reverse Proxy Auth Plugin, rhn-proxy, RTPproxy, rWeb HTTP Proxy, Safenet Authentication Service TokenValidator Proxy Agent, SAP Sybase Unwired Platform Online Data Proxy, SapporoWorks WinProxy, sDNSProxy.exe, Shanghai 2345 Security Guard, Sidewinder G2 Firewall, Signal TLS Proxy, simpleproxy, smtp.proxy, Snapgear Lite+ Firewall, SOCKS 4 Proxy, SOCKS 5 Proxy, Softsphere DefenseWall Personal Firewall, SolarWinds Firewall Security Manager, SonicWall, SonicWALL Analytics On-Prem, SonicWALL Analyzer, SonicWALL AntiSpam , SonicWALL Aventail Sra Ex7000, SonicWALL Continuous Data Protection, SonicWALL Directory Services Connector, SonicWall E-mail Security, SonicWALL Firewall, SonicWALL Global Management System, SonicWALL Global VPN Client, SonicWall GMS, SonicWALL GMS, SonicWALL installer Activex Control, SonicWALL NetExtender, SonicWALL NSA, SonicWALL Pro, SonicWALL Scrutinizer, SonicWALL Scrutinizer Dashboard, SonicWALL SMA100, SonicWALL SMA1000, SonicWALL SMA 100, SonicWALL SMA 200, SonicWALL SMA 210, SonicWALL SMA 400, SonicWALL SMA 410, SonicWALL SMA 500v, SonicWALL SOHO, SonicWALL SOHO3, SonicWALL SOHO Firewall, SonicWALL SonicOS, SonicWALL SonicOSv, SonicWALL SSL-VPN End-Point Interrogator, SonicWALL SSL-VPN VirtualOffice, SonicWALL SSL VPN, SonicWall SSL VPN, SonicWall Ssl Vpn 200, SonicWALL Switch, SonicWALL Tele2, SonicWALL UMA E5000, SonicWALL Viewpoint, SonicWALL ViewPoint, SonicWALL EMail, SonicWALL NetExtender Client, SonicWall NSM On-Prem, SonicWall SMA100, SonicWall SSLVPN SMA100, Sophos Cloud Optix, Sophos Cyberoam Firewall, Sophos EAS Proxy, Sophos Endpoint Protection, Sophos Intercept X Endpoint, Sophos Intercept X for Server, Sophos Mobile, Sophos Secure Web Gateway., Sophos Secure Web Gateway Server, Sophos Web Appliance Remote, Sophos XG Firewall, Squid HTTP Proxy, Squid proxy, Squid Proxy, Squid Web Proxy, squidGuard, Stage File Proxy, StoneSoft Firewall Engine, StoneSoft StoneGate Firewall, StreamAudio Chaincast Proxymanager Activex Control, Sun Java System Web Proxy Server, SuSEfirewall2, Symantec Advanced Secure Gateway, Symantec ASG, Symantec CacheFlow, Symantec Enterprise Firewall, Symantec Firewall, Symantec Norton Personal Firewall, Symantec ProxyClient, Symantec ProxySG, Symantec Raptor Firewall, Symantec Sygate Personal Firewall, Symantec VPN, Symantec VPN Appliance, Symantec VPN Appliances, Symantec Web Gateway, Tallemu Personal Firewall, Tiny Personal Firewall, Tinyproxy, Tips and Tricks HQ All In One WP Security & Firewall, TIS Firewall Toolkit, TIS Internet Firewall Toolkit, Tor Proxy, Trojan-Proxy.Win32.Daemonize.i, Trojan-Proxy.Win32.Delf.ai, Trojan-Proxy.Win32.Ranky.ag, Trojan-Proxy.Win32.Ranky.dh, Trojan-Proxy.Win32.Ranky.gen, Trojan-Proxy.Win32.Ranky.z, Trojan-Proxy.Win32.Raznew.gen, Trojan-Proxy.Win32.Wimain, Trustwave Secure Web Gateway, Tumbleweed Email Firewall, Tumbleweed Mailgate Email Firewall, Tumbleweed MailGate Email Firewall, Uiga Proxy, Uninett radsecproxy, Untangle Firewall NG, Untangle NG Firewall, up-imapproxy, Vergenet Perdition Mail Retrieval Proxy, Watchguard Firewall, WatchGuard SOHO Firewall, webdesproxy, Webproxy, Webroot Desktop Firewall, webroot desktop firewall, WinGate Proxy, YoungZSoft CCProxy, Yurunsoft YurunProxy, Ziproxy, ZoneAlarm, ZoneAlarm Anti-Ransomware, ZoneAlarm Antivirus, ZoneAlarm Firewall, ZoneLabs ZoneAlarm, ZoneLabs Zonealarm Security Suite, ZyWALL, Zyxel ATP, ZyXEL ATP500, ZyXEL UAG, ZyXEL USG, Zyxel USG, ZyXEL USG40, ZyXEL USG1900, Zyxel USG Flex, Zyxel VPN, Zyxel Zywall, ZyXEL ZyWall, ZyXEL ZyWALL, ZyXEL ZyWALL310, ZyXEL ZyWALL1100, Zyxel Zywall 2, ZyXEL ZyWALL 10, ZyXEL ZyWALL 100, ZyXEL ZyWALL USG, Firewall Plugin

PublishedBaseTempVulnerabilityProdExpRemCTICVE
01/22/20226.96.8isomorphic-git cors-proxy server-side request forgerycors-proxyNot DefinedOfficial Fix1.46CVE-2021-23664
01/14/20227.37.0Imperva Web Application Firewall HTTP POST Request encoding errorWeb Application FirewallNot DefinedOfficial Fix0.34CVE-2021-45468
01/11/20226.96.8Cisco ASA/Firepower Threat Defense Web Services Interface out-of-bounds writeASA/Firepower Threat DefenseNot DefinedOfficial Fix0.10CVE-2021-34704
01/11/20226.96.8Cisco ASA/Firepower Threat Defense Web Services Interface out-of-bounds writeASA/Firepower Threat DefenseNot DefinedOfficial Fix0.00CVE-2021-1573
01/10/20226.56.5SonicWALL SonicOS HTTP Response Header stack-based overflowSonicOSNot DefinedNot Defined0.00CVE-2021-20048
01/10/20226.56.5SonicWALL SonicOS HTTP Content-Length stack-based overflowSonicOSNot DefinedNot Defined0.00CVE-2021-20046
01/04/20223.83.7Fortinet FortiOS Restore Command range errorFortiOSNot DefinedOfficial Fix0.66CVE-2021-44168
12/23/20214.34.3SonicWALL SMA 100 Management API access controlSMA 100Not DefinedNot Defined0.06CVE-2021-20050
12/23/20213.73.7SonicWALL SMA100 Password Change API information exposureSMA100Not DefinedNot Defined0.07CVE-2021-20049
12/13/20214.24.1Fortinet FortiOS Local Privilege EscalationFortiOSNot DefinedOfficial Fix0.09CVE-2021-36169
12/09/20218.08.0Fortinet FortiOS Firmware Signature Verification heap-based overflowFortiOSNot DefinedNot Defined0.33CVE-2021-36173
12/08/20216.46.3Fortinet FortiOS SSL VPN hard-coded keyFortiOSNot DefinedOfficial Fix0.09CVE-2021-26108
12/08/20216.46.4Fortinet FortiOS/FortiProxy Login Page path traversalFortiOS/FortiProxyNot DefinedNot Defined0.05CVE-2021-41024
12/08/20218.78.5Fortinet FortiOS SSL VPN integer overflowFortiOSNot DefinedOfficial Fix0.38CVE-2021-26109
12/08/20218.38.1Fortinet FortiOS/FortiProxy autod Daemon access controlFortiOS/FortiProxyNot DefinedOfficial Fix0.26CVE-2021-26110
12/08/20217.17.0Fortinet FortiProxy/FortiGate User Interface insufficient verification of data authenticityFortiProxy/FortiGateNot DefinedOfficial Fix0.24CVE-2021-26103
12/08/20217.06.8Fortinet FortiOS TFTP Client stack-based overflowFortiOSNot DefinedOfficial Fix0.14CVE-2021-42757
12/08/20217.37.3SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v RAC_COPY_TO buffer overflowSMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500vNot DefinedNot Defined0.06CVE-2021-20045
12/08/20216.36.3SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v os command injectionSMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500vNot DefinedNot Defined0.13CVE-2021-20044
12/08/20216.36.3SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v heap-based overflowSMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500vNot DefinedNot Defined0.00CVE-2021-20043
12/08/20217.37.3SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v Firewall Rule confused deputySMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500vNot DefinedNot Defined0.00CVE-2021-20042
12/08/20215.35.2SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v HTTP Request sonicfiles infinite loopSMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500vNot DefinedWorkaround0.00CVE-2021-20041
12/08/20217.37.3SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v Upload path traversalSMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500vNot DefinedNot Defined0.05CVE-2021-20040
12/08/20216.36.3SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v Management Interface viewcert os command injectionSMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500vNot DefinedNot Defined0.05CVE-2021-20039
12/08/20216.36.3SonicWALL Global VPN Client uncontrolled search pathGlobal VPN ClientNot DefinedNot Defined0.06CVE-2021-20047
12/08/20217.37.3SonicWALL SMA100/SMA 200/SMA 210/SMA 400/SMA 410 mod_cgi module stack-based overflowSMA100/SMA 200/SMA 210/SMA 400/SMA 410Not DefinedNot Defined0.19CVE-2021-20038
12/01/20214.84.8Yurunsoft YurunProxy Client.php exit cross site scriptingYurunProxyNot DefinedNot Defined0.03CVE-2021-43690
11/18/20214.44.4Fortinet FortiOS CLI information disclosureFortiOSNot DefinedNot Defined0.00CVE-2021-32600
11/10/20217.27.0Palo Alto PAN-OS GlobalProtect Portal access controlPAN-OSNot DefinedOfficial Fix0.00CVE-2021-3062
11/10/20218.17.9Palo Alto PAN-OS Simple Certificate Enrollment Protocol os command injectionPAN-OSNot DefinedOfficial Fix0.05CVE-2021-3060
11/10/20216.46.3Palo Alto PAN-OS GlobalProtect Portal exceptional conditionPAN-OSNot DefinedOfficial Fix0.05CVE-2021-3063
11/10/20216.56.3Palo Alto PAN-OS Command Line Interface os command injectionPAN-OSNot DefinedOfficial Fix0.05CVE-2021-3061
11/10/20218.17.9Palo Alto PAN-OS Management Interface os command injectionPAN-OSNot DefinedOfficial Fix0.06CVE-2021-3059
11/10/20218.07.8Palo Alto PAN-OS Web Interface os command injectionPAN-OSNot DefinedOfficial Fix0.09CVE-2021-3058
11/10/20219.89.6Palo Alto PAN-OS GlobalProtect Portal stack-based overflowPAN-OSNot DefinedOfficial Fix0.05CVE-2021-3064
11/10/20218.88.6Palo Alto PAN-OS GlobalProtect Clientless VPN buffer overflowPAN-OSNot DefinedOfficial Fix0.05CVE-2021-3056
11/03/20214.24.2Fortinet FortiOS LDAP Server certificate validationFortiOSNot DefinedNot Defined0.05CVE-2021-41019
10/28/20214.44.4Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.05CVE-2021-34764
10/28/20214.04.0Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.05CVE-2021-34763
10/28/20214.74.7Cisco Firepower Threat Defense CLI Command file inclusionFirepower Threat DefenseNot DefinedOfficial Fix0.00CVE-2021-34761
10/28/20217.87.6Cisco Firepower Threat Defense CLI input validationFirepower Threat DefenseNot DefinedOfficial Fix0.04CVE-2021-34756
10/28/20217.87.6Cisco Firepower Threat Defense CLI input validationFirepower Threat DefenseNot DefinedOfficial Fix0.05CVE-2021-34755
10/28/20217.57.4Cisco FirePOWER Management Center Web-based Management Interface path traversalFirePOWER Management CenterNot DefinedOfficial Fix0.07CVE-2021-34762
10/28/20216.96.8Cisco Firepower Threat Defense Deep Packet Inspection access controlFirepower Threat DefenseNot DefinedOfficial Fix0.10CVE-2021-34754
10/28/20217.97.8Cisco Firepower Threat Defense SSH Connection memory corruptionFirepower Threat DefenseNot DefinedOfficial Fix0.00CVE-2021-34781
10/28/20217.97.8Cisco ASA/Firepower Threat Defense Web Services Interface stack-based overflowASA/Firepower Threat DefenseNot DefinedOfficial Fix0.05CVE-2021-40118
10/28/20217.97.8Cisco ASA/Firepower Threat Defense SSL/TLS memory corruptionASA/Firepower Threat DefenseNot DefinedOfficial Fix0.05CVE-2021-40117
10/28/20215.45.3Cisco ASA/Firepower Threat Defense Network Address Translation security check for standardASA/Firepower Threat DefenseNot DefinedOfficial Fix0.04CVE-2021-34791
10/28/20215.45.3Cisco ASA/Firepower Threat Defense Network Address Translation security check for standardASA/Firepower Threat DefenseNot DefinedOfficial Fix0.05CVE-2021-34790
10/28/20216.05.9Cisco ASA/Firepower Threat Defense IDFW Rule access controlASA/Firepower Threat DefenseNot DefinedOfficial Fix0.05CVE-2021-34787

2333 more entries are not shown

Want to stay up to date on a daily basis?

Enable the mail alert feature now!