Page 13 of 71 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

Watchguard SOHO firewall 5.0.35 unpredictably disables certain IP restrictions for customized services that were set before the administrator upgrades to 5.0.35, which could allow remote attackers to bypass the intended access control rules. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0009.html http://online.securityfocus.com/archive/1/266948 http://www.iss.net/security_center/static/8814.php http://www.securityfocus.com/bid/4491 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 2

SMTP proxy in WatchGuard Firebox (2500 and 4500) 4.5 and 4.6 allows a remote attacker to bypass firewall filtering via a base64 MIME encoded email attachment whose boundary name ends in two dashes. • http://marc.info/?l=bugtraq&m=99379787421319&w=2 http://www.securityfocus.com/archive/1/189783 http://www.securityfocus.com/bid/2855 https://exchange.xforce.ibmcloud.com/vulnerabilities/6682 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Watchguard Firebox II prior to 4.6 allows a remote attacker to create a denial of service in the kernel via a large stream (>10,000) of malformed ICMP or TCP packets. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0054.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6327 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Watchguard Firebox II allows remote attackers to cause a denial of service by establishing multiple connections and sending malformed PPTP packets. • http://www.securityfocus.com/archive/1/162965 http://www.securityfocus.com/bid/2369 https://exchange.xforce.ibmcloud.com/vulnerabilities/6109 •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 1

Watchguard Firebox II firewall allows users with read-only access to gain read-write access, and administrative privileges, by accessing a file that contains hashed passphrases, and using the hashes during authentication. • http://archives.neohapsis.com/archives/bugtraq/2001-01/0342.html http://www.securityfocus.com/bid/2284 https://exchange.xforce.ibmcloud.com/vulnerabilities/5979 •