2 results (0.009 seconds)

CVSS: 7.5EPSS: 55%CPEs: 1EXPL: 1

sre/params.php in the Integrity Clientless Security (ICS) component in Check Point Connectra NGX R62 3.x and earlier before Security Hotfix 5, and possibly VPN-1 NGX R62, allows remote attackers to bypass security requirements via a crafted Report parameter, which returns a valid ICSCookie authentication token. El archivo sre/params.php en el componente Integrity Clientless Security (ICS) en Check Point Connectra NGX R62 versión 3.x y anteriores a Security Hotfix versión 5, y posiblemente VPN-1 NGX R62, permite a los atacantes remotos omitir los requisitos de seguridad por medio de un parámetro Report creado, que devuelve un token de autenticación ICSCookie válido. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051920.html http://osvdb.org/31655 http://secunia.com/advisories/23847 http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472 http://securityreason.com/securityalert/2179 http://securitytracker.com/id?1017559 http://securitytracker.com/id?1017560 http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html http://w • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Check Point NGX R60 does not properly verify packets against the predefined service group "CIFS" rule, which allows remote attackers to bypass intended restrictions. • http://marc.info/?l=bugtraq&m=112611529724821&w=2 http://www.kb.cert.org/vuls/id/508209 •