CVE-2005-4093 – Check Point VPN-1 SecureClient 4.0 < 4.1 - Policy Bypass
https://notcve.org/view.php?id=CVE-2005-4093
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint. • https://www.exploit-db.com/exploits/26754 http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html http://secunia.com/advisories/17837 http://secunia.com/advisories/23395 http://securitytracker.com/id?1015326 http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html http://www.securityfocus.com/bid/15757 http://www.us.debian.org/security/2006/dsa-1237 http://www.vupen.com/english& • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-2313
https://notcve.org/view.php?id=CVE-2005-2313
Check Point SecuRemote NG with Application Intelligence R54 allows attackers to obtain credentials and gain privileges via unknown attack vectors. Check Point SecuRemote NG with Application Intelligence R54 permite que atacantes obtengan credenciales y ganen privilegios mediante formas de ataque desconocidas. • http://www.securityfocus.com/bid/14221 •