Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Antivirus_plus_firewall
(Avg)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2006-12-18 | CVE-2006-6623 | Sygate Personal Firewall 5.6.2808 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. | Antivirus_plus_firewall, Comodo_personal_firewall, Personal_firewall, Antihook, Look_n_stop, Sygate_personal_firewall | N/A | ||
2006-12-18 | CVE-2006-6622 | Soft4Ever Look 'n' Stop (LnS) 2.05p2 before 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. | Antivirus_plus_firewall, Comodo_personal_firewall, Personal_firewall, Antihook, Look_n_stop, Sygate_personal_firewall | N/A | ||
2006-12-18 | CVE-2006-6621 | Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. | Antivirus_plus_firewall, Comodo_personal_firewall, Personal_firewall, Antihook, Look_n_stop, Sygate_personal_firewall | N/A | ||
2006-12-18 | CVE-2006-6620 | Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. | Antivirus_plus_firewall, Comodo_personal_firewall, Personal_firewall, Antihook, Look_n_stop, Sygate_personal_firewall | N/A | ||
2006-12-18 | CVE-2006-6619 | AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. | Antivirus_plus_firewall, Comodo_personal_firewall, Personal_firewall, Antihook, Look_n_stop, Sygate_personal_firewall | N/A | ||
2006-12-18 | CVE-2006-6618 | AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. | Antivirus_plus_firewall, Comodo_personal_firewall, Personal_firewall, Antihook, Look_n_stop, Sygate_personal_firewall | N/A |