Vulnerabilities
Vulnerable Software
Smoothwall:  Security Vulnerabilities
A cross-site scripting (XSS) vulnerability in Smoothwall Express 3.
CVSS Score
6.1
EPSS Score
0.002
Published
2020-02-07
CSRF vulnerability in Smoothwall Express 3.
CVSS Score
8.8
EPSS Score
0.002
Published
2020-02-07
Multiple cross-site request forgery (CSRF) vulnerabilities in Smoothwall Express 3.1 and 3.0 SP3 allow remote attackers to hijack the authentication of administrators for requests that change the (1) admin or (2) dial password via a request to httpd/cgi-bin/changepw.cgi.
CVSS Score
6.8
EPSS Score
0.001
Published
2014-12-31
Cross-site scripting (XSS) vulnerability in httpd/cgi-bin/vpn.cgi/vpnconfig.dat in Smoothwall Express 3.0 SP3 allows remote attackers to inject arbitrary web script or HTML via the COMMENT parameter in an Add action.
CVSS Score
4.3
EPSS Score
0.002
Published
2014-12-31
Multiple cross-site scripting (XSS) vulnerabilities in Smoothwall Express 3.1 and 3.0 SP3 allow remote attackers to inject arbitrary web script or HTML via the (1) PROFILENAME parameter in a Save action to httpd/cgi-bin/pppsetup.cgi or (2) COMMENT parameter in an Add action to httpd/cgi-bin/ddns.cgi.
CVSS Score
4.3
EPSS Score
0.002
Published
2014-12-31
Cross-site request forgery (CSRF) vulnerability in the web management interface in httpd/cgi-bin/shutdown.cgi in Smoothwall Express 3.1 and 3.0 SP3 and earlier allows remote attackers to hijack the authentication of administrators for requests that perform a reboot via a request to cgi-bin/shutdown.cgi.
CVSS Score
6.8
EPSS Score
0.003
Published
2014-12-31
Cross-site scripting (XSS) vulnerability in the web management interface in httpd/cgi-bin/ipinfo.cgi in Smoothwall Express 3.1 and 3.0 SP3 and earlier allows remote attackers to inject arbitrary web script or HTML via the IP parameter in a Run action.
CVSS Score
4.3
EPSS Score
0.034
Published
2014-12-31
SmoothWall SmoothGuardian, as used in SmoothWall Firewall, NetworkGuardian, and SchoolGuardian 2008, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.
CVSS Score
5.4
EPSS Score
0.01
Published
2009-03-04
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
CVSS Score
10.0
EPSS Score
0.574
Published
2003-05-05


Contact Us

Shodan ® - All rights reserved