Filtered by vendor Sonicwall
Subscribe
Total
167 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2003-1320 | 1 Sonicwall | 1 Firmware | 2024-02-04 | 5.1 MEDIUM | N/A |
SonicWALL firmware before 6.4.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly including (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload. | |||||
CVE-2000-1097 | 1 Sonicwall | 1 Soho Firewall | 2024-02-04 | 5.0 MEDIUM | N/A |
The web server for the SonicWALL SOHO firewall allows remote attackers to cause a denial of service via a long username in the authentication page. | |||||
CVE-2002-2341 | 1 Sonicwall | 1 Soho3 | 2024-02-04 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in content blocking in SonicWALL SOHO3 6.3.0.0 allows remote attackers to inject arbitrary web script or HTML via a blocked URL. | |||||
CVE-2000-1098 | 1 Sonicwall | 1 Soho Firewall | 2024-02-04 | 5.0 MEDIUM | N/A |
The web server for the SonicWALL SOHO firewall allows remote attackers to cause a denial of service via an empty GET or POST request. | |||||
CVE-2001-0376 | 1 Sonicwall | 2 Soho2, Tele2 | 2024-02-04 | 7.5 HIGH | N/A |
SonicWALL Tele2 and SOHO firewalls with 6.0.0.0 firmware using IPSEC with IKE pre-shared keys do not allow for the use of full 128 byte IKE pre-shared keys, which is the intended design of the IKE pre-shared key, and only support 48 byte keys. This allows a remote attacker to brute force attack the pre-shared keys with significantly less resources than if the full 128 byte IKE pre-shared keys were used. | |||||
CVE-2002-2181 | 1 Sonicwall | 1 Content Filtering | 2024-02-04 | 5.0 MEDIUM | N/A |
SonicWall Content Filtering allows local users to access prohibited web sites via requests to the web site's IP address instead of the domain name. | |||||
CVE-2001-1104 | 1 Sonicwall | 2 Soho, Soho Firmware | 2024-02-04 | 7.5 HIGH | N/A |
SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote attackers to spoof or hijack sessions. |