Kerio Personal Firewall (KPF) 2.1.4 has a default rule to accept incoming packets from DNS (UDP port 53), which allows remote attackers to bypass the firewall filters via packets with a source port of 53.
Max CVSS
7.5
EPSS Score
0.89%
Published
2003-12-31
Updated
2017-07-29
Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer 5.6.3 allow remote attackers to insert arbitrary web script via (1) the add_name parameter in the add_acl module, or (2) the alias parameter in the do_map module.
Max CVSS
5.1
EPSS Score
2.56%
Published
2003-08-07
Updated
2017-07-11
Multiple buffer overflows in Kerio MailServer 5.6.3 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via (1) a long showuser parameter in the do_subscribe module, (2) a long folder parameter in the add_acl module, (3) a long folder parameter in the list module, and (4) a long user parameter in the do_map module.
Max CVSS
7.5
EPSS Score
1.71%
Published
2003-08-07
Updated
2017-07-11

CVE-2003-0220

Public exploit
Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet.
Max CVSS
7.5
EPSS Score
52.61%
Published
2003-05-12
Updated
2016-10-18
Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute administrator commands by sniffing packets from a valid session and replaying them against the remote administration server.
Max CVSS
7.5
EPSS Score
4.44%
Published
2003-05-12
Updated
2016-10-18
Multiple cross-site scripting (XSS) vulnerabilities in the Web mail module of Kerio MailServer 5.0 allow remote attackers to execute HTML script as other users via certain URLs.
Max CVSS
6.8
EPSS Score
0.69%
Published
2003-04-11
Updated
2008-09-05
Kerio MailServer 5.0 allows remote attackers to cause a denial of service (hang) via SYN packets to the supported network services.
Max CVSS
5.0
EPSS Score
0.67%
Published
2003-04-11
Updated
2008-09-05
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!