📦 Kerio Control
by Gfi
🔍 What is Kerio Control?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This authentication bypass vulnerability in GFI Kerio Control allows unauthenticated attackers to gain full administrative access to the firewall appliance by exploiting insecure proxy configuration. ...
This critical vulnerability in GFI Kerio Control allows attackers with administrative access to upload malicious firmware images and execute arbitrary code with root privileges. The system fails to va...
This vulnerability in GFI Kerio Control allows attackers to perform open redirect, HTTP response splitting, and reflected cross-site scripting (XSS) attacks via unsanitized input in certain web pages....