Filtered by vendor Watchguard
Subscriptions
Total
78 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2015-5453 | 1 Watchguard | 1 Xcs | 2025-04-12 | N/A |
| Watchguard XCS 9.2 and 10.0 before build 150522 allow remote authenticated users to execute arbitrary commands via shell metacharacters in the id parameter to ADMIN/mailqueue.spl. | ||||
| CVE-2014-0338 | 1 Watchguard | 1 Fireware | 2025-04-12 | N/A |
| Multiple cross-site scripting (XSS) vulnerabilities in the firewall policy management pages in WatchGuard Fireware XTM before 11.8.3 allow remote attackers to inject arbitrary web script or HTML via the pol_name parameter. | ||||
| CVE-2013-6021 | 1 Watchguard | 1 Fireware | 2025-04-11 | N/A |
| Buffer overflow in WGagent in WatchGuard WSM and Fireware before 11.8 allows remote attackers to execute arbitrary code via a long sessionid value in a cookie. | ||||
| CVE-2013-5701 | 1 Watchguard | 1 Server Center | 2025-04-11 | N/A |
| Multiple untrusted search path vulnerabilities in (1) Watchguard Log Collector (wlcollector.exe) and (2) Watchguard WebBlocker Server (wbserver.exe) in WatchGuard Server Center 11.7.4, 11.7.3, and possibly earlier allow local users to gain privileges via a Trojan horse wgpr.dll file in the application's bin directory. | ||||
| CVE-2011-2165 | 1 Watchguard | 1 Xcs | 2025-04-11 | N/A |
| The STARTTLS implementation in WatchGuard XCS 9.0 and 9.1 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. | ||||
| CVE-2013-5702 | 1 Watchguard | 2 Fireware, Watchguard System Manager | 2025-04-11 | N/A |
| Multiple cross-site scripting (XSS) vulnerabilities in WebCenter in WatchGuard WSM and Fireware before 11.8 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters. | ||||
| CVE-2008-1618 | 1 Watchguard | 1 Firebox Pptp Vpn | 2025-04-09 | N/A |
| The PPTP VPN service in Watchguard Firebox before 10, when performing the MS-CHAPv2 authentication handshake, generates different error codes depending on whether the username is valid or invalid, which allows remote attackers to enumerate valid usernames. | ||||
| CVE-2001-0692 | 1 Watchguard | 2 Firebox 2500, Firebox 4500 | 2025-04-03 | N/A |
| SMTP proxy in WatchGuard Firebox (2500 and 4500) 4.5 and 4.6 allows a remote attacker to bypass firewall filtering via a base64 MIME encoded email attachment whose boundary name ends in two dashes. | ||||
| CVE-2002-1979 | 1 Watchguard | 3 Legacy Rssa, Soho, Vclass | 2025-04-03 | N/A |
| WatchGuard SOHO products running firmware 5.1.6 and earlier, and Vclass/RSSA using 3.2 SP1 and earlier, allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server. | ||||
| CVE-2001-0049 | 1 Watchguard | 1 Soho Firewall | 2025-04-03 | N/A |
| WatchGuard SOHO FireWall 2.2.1 and earlier allows remote attackers to cause a denial of service via a large number of GET requests. | ||||
| CVE-2001-0203 | 1 Watchguard | 1 Firebox Ii | 2025-04-03 | N/A |
| Watchguard Firebox II firewall allows users with read-only access to gain read-write access, and administrative privileges, by accessing a file that contains hashed passphrases, and using the hashes during authentication. | ||||
| CVE-2002-1520 | 2 Rapidstream, Watchguard | 2 Rapidstream, Firebox | 2025-04-03 | N/A |
| The CLI interface for WatchGuard Firebox Vclass 3.2 and earlier, and RSSA Appliance 3.0.2, does not properly close the SSH connection when a -N option is provided during authentication, which allows remote attackers to access CLI with administrator privileges. | ||||
| CVE-2000-0895 | 1 Watchguard | 1 Soho Firewall | 2025-04-03 | N/A |
| Buffer overflow in HTTP server on the WatchGuard SOHO firewall allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long GET request. | ||||
| CVE-2000-0894 | 1 Watchguard | 1 Soho Firewall | 2025-04-03 | N/A |
| HTTP server on the WatchGuard SOHO firewall does not properly restrict access to administrative functions such as password resets or rebooting, which allows attackers to cause a denial of service or conduct unauthorized activities. | ||||
| CVE-2001-0204 | 1 Watchguard | 1 Firebox Ii | 2025-04-03 | N/A |
| Watchguard Firebox II allows remote attackers to cause a denial of service by establishing multiple connections and sending malformed PPTP packets. | ||||
| CVE-2000-0896 | 1 Watchguard | 1 Soho Firewall | 2025-04-03 | N/A |
| WatchGuard SOHO firewall allows remote attackers to cause a denial of service via a flood of fragmented IP packets, which causes the firewall to drop connections and stop forwarding packets. | ||||
| CVE-2002-0527 | 1 Watchguard | 1 Soho Firewall | 2025-04-03 | N/A |
| Watchguard SOHO firewall before 5.0.35 allows remote attackers to cause a denial of service (crash and reboot) when SOHO forwards a packet with bad IP options. | ||||
| CVE-2002-1047 | 1 Watchguard | 1 Soho Firewall | 2025-04-03 | N/A |
| The FTP service in Watchguard Soho Firewall 5.0.35a allows remote attackers to gain privileges with a correct password but an incorrect user name. | ||||
| CVE-2002-0528 | 1 Watchguard | 1 Soho Firewall | 2025-04-03 | N/A |
| Watchguard SOHO firewall 5.0.35 unpredictably disables certain IP restrictions for customized services that were set before the administrator upgrades to 5.0.35, which could allow remote attackers to bypass the intended access control rules. | ||||
| CVE-2002-1519 | 2 Rapidstream, Watchguard | 2 Rapidstream, Firebox | 2025-04-03 | N/A |
| Format string vulnerability in the CLI interface for WatchGuard Firebox Vclass 3.2 and earlier, and RSSA Appliance 3.0.2, allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in the password parameter. | ||||