6 results (0.013 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect). El applet de autenticación en el sistema operativo Watchguard Fireware 11.11 ha reflejado XSS (esto también puede causar una redirección abierta). • https://www.sec-1.com/blog/2016/sec-1-advisory-reflected-cross-site-scripting-open-redirect-watchguard-fireware-v11-11 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

An FBX-5313 issue was discovered in WatchGuard Fireware before 12.0. When a failed login attempt is made to the login endpoint of the XML-RPC interface, if JavaScript code, properly encoded to be consumed by XML parsers, is embedded as value of the user element, the code will be rendered in the context of any logged in user in the Web UI visiting "Traffic Monitor" sections "Events" and "All." As a side effect, no further events will be visible in the Traffic Monitor until the device is restarted. Se ha descubierto un problema FBX-5313 en WatchGuard Fireware en versiones anteriores a la 12.0. Cuando se realiza un intento fallido de inicio de sesión en el punto de conexión de inicio de sesión de la interfaz XML-RPC, si el código JavaScript, codificado para ser consumido por los analizadores sintácticos XML, se embebe como valor del elemento usuario, el código será procesado en el contexto de cualquier usuario que haya iniciado sesión en la interfaz web y que visite las secciones de "Events" y "All" de"Traffic Monitor". • http://seclists.org/bugtraq/2017/Sep/22 https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000L0HSAU&lang=en_US https://www.sidertia.com/Home/Community/Blog/2017/09/18/Fixed-Fireware-XXE-DOS-and-stored-XSS-vulnerabilities-discovered-by-Sidertia • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

An FBX-5312 issue was discovered in WatchGuard Fireware before 12.0. If a login attempt is made in the XML-RPC interface with an XML message containing an empty member element, the wgagent crashes, logging out any user with a session opened in the UI. By continuously executing the failed login attempts, UI management of the device becomes impossible. Se ha descubierto un problema FBX-5312 en WatchGuard Fireware en versiones anteriores a la 12.0. Si se intenta iniciar sesión en la interfaz XML-RPC con un mensaje XML que contiene un elemento de miembro vacío, se produce el cierre inesperado de wgagent, cerrando la sesión de cualquier usuario con sesión iniciada en la interfaz de usuario. • http://www.securityfocus.com/archive/1/540427 https://www.sidertia.com/Home/Community/Blog/2017/09/18/Fixed-Fireware-XXE-DOS-and-stored-XSS-vulnerabilities-discovered-by-Sidertia • CWE-400: Uncontrolled Resource Consumption •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in the firewall policy management pages in WatchGuard Fireware XTM before 11.8.3 allow remote attackers to inject arbitrary web script or HTML via the pol_name parameter. Múltiples vulnerabilidades de XSS en las páginas de gestión de política de firewall en WatchGuard Fireware XTM anterior a 11.8.3 permiten a atacantes remotos inyectar script Web o HTML arbitrarios a través del parámetro pol_name. • http://seclists.org/fulldisclosure/2014/Mar/154 http://watchguardsecuritycenter.com/2014/03/13/fireware-xtm-11-8-3-update-corrects-xss-flaw http://www.kb.cert.org/vuls/id/807134 http://www.securityfocus.com/bid/66210 http://www.securitytracker.com/id/1029924 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 12%CPEs: 12EXPL: 4

Buffer overflow in WGagent in WatchGuard WSM and Fireware before 11.8 allows remote attackers to execute arbitrary code via a long sessionid value in a cookie. Desbordamiento de buffer en WGagent de WatchGuard WSM y Fireware anterior a la versión 11.8 permite a atacantes remotos ejecutar código arbitrario a través de un valor largo de sessionid en una cookie. • https://www.exploit-db.com/exploits/29273 http://osvdb.org/98752 http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8 http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes http://www.exploit-db.com/exploits/29273 http://www.kb.cert.org/vuls/id/233990 http://www.securityfocus.com/bid/63227 https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •