Lucene search

K
WatchguardSoho Firewall

8 matches found

CVE
CVE
added 2001/02/16 5:0 a.m.42 views

CVE-2001-0049

WatchGuard SOHO FireWall 2.2.1 and earlier allows remote attackers to cause a denial of service via a large number of GET requests.

5CVSS7AI score0.03532EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.41 views

CVE-2000-0894

HTTP server on the WatchGuard SOHO firewall does not properly restrict access to administrative functions such as password resets or rebooting, which allows attackers to cause a denial of service or conduct unauthorized activities.

10CVSS6.7AI score0.00411EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.37 views

CVE-2002-1046

Dynamic VPN Configuration Protocol service (DVCP) in Watchguard Firebox firmware 5.x.x allows remote attackers to cause a denial of service (crash) via a malformed packet containing tab characters to TCP port 4110.

5CVSS7AI score0.00886EPSS
CVE
CVE
added 2002/08/12 4:0 a.m.36 views

CVE-2002-0528

Watchguard SOHO firewall 5.0.35 unpredictably disables certain IP restrictions for customized services that were set before the administrator upgrades to 5.0.35, which could allow remote attackers to bypass the intended access control rules.

10CVSS7.2AI score0.00796EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.35 views

CVE-2000-0895

Buffer overflow in HTTP server on the WatchGuard SOHO firewall allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long GET request.

10CVSS8AI score0.03575EPSS
CVE
CVE
added 2002/10/04 4:0 a.m.31 views

CVE-2002-1047

The FTP service in Watchguard Soho Firewall 5.0.35a allows remote attackers to gain privileges with a correct password but an incorrect user name.

7.5CVSS7.4AI score0.00554EPSS
CVE
CVE
added 2002/08/12 4:0 a.m.30 views

CVE-2002-0527

Watchguard SOHO firewall before 5.0.35 allows remote attackers to cause a denial of service (crash and reboot) when SOHO forwards a packet with bad IP options.

5CVSS7AI score0.009EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.29 views

CVE-2000-0896

WatchGuard SOHO firewall allows remote attackers to cause a denial of service via a flood of fragmented IP packets, which causes the firewall to drop connections and stop forwarding packets.

5CVSS6.6AI score0.00915EPSS