Vulnerability Assessment & Network Security Forums



The comprehensive list of vulnerabilities in this category are updated on a daily basis.  There are currently 2,554 vulnerability test descriptions and summaries in the database.  Clicking on the name of the vulnerability below will bring up the specific details for each network security test along with recommendations for patching the vulnerability and related discussions.

Home >> Browse Vulnerability Assessment Database >> Firewalls

Vulnerability assessments available for:
Firewalls


Vulnerability Name Vulnerability Description Network Security Threat Type
1) Arkoon identification Determines if the remote host is an Arkoon infos
2) BenHur Firewall active FTP firewall leak Connects to a few services with sport = 20 infos
3) BlueCoat ProxySG console management detection Checks for BlueCoat web console management infos
4) CCProxy Detection Detects CCProxy infos
5) Check Point Firewall-1 ICA Service Detection Checks for Check Point ICA Service infos
6) Checkpoint Firewall open Web adminstration Determines if the remote Checkpoint Firewall is open to Web adminstration infos
7) CheckPoint Firewall-1 HTTP Client Authentication Detection Connects to FW1 Client Authentication Server infos
8) CheckPoint Firewall-1 Telnet Client Authentication Detection Connects to FW1 Client Authentication Server infos
9) Checkpoint FW-1 identification Determines if the remote host is a FW/1 infos
10) Checkpoint SecuRemote information leakage Checkpoint SecuRemote information leakage infos
11) Checkpoint SecureRemote detection Determine if a remote host is running CheckPoint's SecureRemote infos
12) Finjan restart command determines if the remote proxy can connect against itself infos
13) Gopherd Proxy Usage Determines if gopherd can be used as a proxy infos
14) IBM Tivoli Relay Overflow Tests for the overflow in Tivoli relay daemon destructive_attack
15) icmp netmask request Sends an ICMP_MASKREQ infos
16) icmp timestamp request Performs an ICMP timestamp request infos
17) Kerio personal Firewall buffer overflow Buffer overflow on KPF administration port destructive_attack
18) Kerio WinRoute Firewall HTTP/HTTPS Management Detection Check if Kerio WinRoute Firewall HTTP/HTTPS management is enabled infos
19) L2TP detection Determine if a remote host is running a L2TP (VPN) service infos
20) NetAsq identification Determines if the remote host is a NetAsq infos
21) Open Web Proxy Server Determines if we can use the remote web proxy infos
22) Passwordless Wingate installed Determines if wingate is installed infos
23) PIX's smtp content filtering attempts to communicate directly with the remote SMTP server infos
24) Proxy accepts CONNECT requests Determines if we can use the remote web proxy against any port infos
25) Proxy accepts gopher:// requests Determines if we can use the remote web proxy to do gopher requests infos
26) Proxy accepts POST requests Determines if we can use the remote web proxy against any port infos
27) RADIUS server detection Detect a radius server infos
28) Raptor FW version 6.5 detection Checks if the remote host is protected by Raptor FW 6.5 infos
29) Remote host on same physical but not logical network Performs an ARP who-is on the remote host infos
30) Remote host replies to SYN+FIN Sends a SYN+FIN packet and expects a SYN+ACK infos
31) Source routed packets Send loose source routed IP packets attack
32) StoneGate client authentication detection Check for StoneGate firewall client authentication prompt infos
33) UDP packets with source port of 53 bypass firewall rules By-passes the remote firewall rules attack
34) Usable remote proxy on any port Determines if we can use the remote web proxy against any port infos
35) Weak Initial Sequence Number checks for ISN infos
36) Zebra default password Logs into the remote host infos
37) ZoneAlarm Local Privilege Escalation Vulnerability Checks version of ZoneAlarm infos
38) ZoneAlarm Personal Firewall port 67 flaw Check ZoneAlarm version infos
39) ZoneAlarm Pro local DoS Check ZoneAlarm Pro version infos