Page 7 of 77 results (0.008 seconds)

CVSS: 10.0EPSS: 3%CPEs: 9EXPL: 0

02 Apr 2003 — Format string vulnerability in the CLI interface for WatchGuard Firebox Vclass 3.2 and earlier, and RSSA Appliance 3.0.2, allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in the password parameter. Vulnerabilidad de cadena de formato en el interfaz CLI de Watchguard Firebox Vclass 3.2 y anteriores, RSSA Appliance 3.0.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante especific... • http://archives.neohapsis.com/archives/bugtraq/2002-09/0325.html •

CVSS: 10.0EPSS: 2%CPEs: 9EXPL: 0

02 Apr 2003 — The CLI interface for WatchGuard Firebox Vclass 3.2 and earlier, and RSSA Appliance 3.0.2, does not properly close the SSH connection when a -N option is provided during authentication, which allows remote attackers to access CLI with administrator privileges. El interfaz CLI de WatchGuard Firebox Vclass 3.2 y anteriores, y RSSA Appliance 3.0.2 no cierra adecuadamente la conexión SSH cuando se provee una opción -N durante autenticación, lo que permite a atacantes remotos acceder a CLI con privilegios de adm... • http://archives.neohapsis.com/archives/bugtraq/2002-09/0325.html •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2002 — WatchGuard SOHO products running firmware 5.1.6 and earlier, and Vclass/RSSA using 3.2 SP1 and earlier, allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server. • http://www.kb.cert.org/vuls/id/328867 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 1

04 Oct 2002 — Dynamic VPN Configuration Protocol service (DVCP) in Watchguard Firebox firmware 5.x.x allows remote attackers to cause a denial of service (crash) via a malformed packet containing tab characters to TCP port 4110. • http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0012.html •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

31 Aug 2002 — The FTP service in Watchguard Soho Firewall 5.0.35a allows remote attackers to gain privileges with a correct password but an incorrect user name. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0139.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

11 Jun 2002 — Watchguard SOHO firewall before 5.0.35 allows remote attackers to cause a denial of service (crash and reboot) when SOHO forwards a packet with bad IP options. Watchguard SOHO firewall anteriores 5.0.35 permite a atacantes remotos provocar la Denegación de Servicios (caida y reinicio), cuando SOHO envía un paquete con las opciones IP erróneas. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0006.html •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

11 Jun 2002 — Watchguard SOHO firewall 5.0.35 unpredictably disables certain IP restrictions for customized services that were set before the administrator upgrades to 5.0.35, which could allow remote attackers to bypass the intended access control rules. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0009.html •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 2

20 Sep 2001 — SMTP proxy in WatchGuard Firebox (2500 and 4500) 4.5 and 4.6 allows a remote attacker to bypass firewall filtering via a base64 MIME encoded email attachment whose boundary name ends in two dashes. • http://marc.info/?l=bugtraq&m=99379787421319&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

27 Jul 2001 — Watchguard Firebox II prior to 4.6 allows a remote attacker to create a denial of service in the kernel via a large stream (>10,000) of malformed ICMP or TCP packets. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0054.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

02 Jun 2001 — Watchguard Firebox II allows remote attackers to cause a denial of service by establishing multiple connections and sending malformed PPTP packets. • http://www.securityfocus.com/archive/1/162965 •