Total vulnerabilities in the database
Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value.
Software | From | Fixed in |
---|---|---|
comodo / comodo_firewall_pro | - | 2.4.17.183.x |