12 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

Unquoted Windows search path vulnerability in Check Point VPN-1 SecureClient might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run when SecureClient attempts to launch the Sr_GUI.exe program. • http://secdev.zoller.lu/research/checkpoint.txt http://www.securityfocus.com/archive/1/422263/100/0/threaded http://www.securityfocus.com/bid/16290 http://www.vupen.com/english/advisories/2006/0258 •

CVSS: 6.5EPSS: 2%CPEs: 4EXPL: 1

Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint. • https://www.exploit-db.com/exploits/26754 http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html http://secunia.com/advisories/17837 http://secunia.com/advisories/23395 http://securitytracker.com/id?1015326 http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html http://www.securityfocus.com/bid/15757 http://www.us.debian.org/security/2006/dsa-1237 http://www.vupen.com/english& • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 88%CPEs: 2EXPL: 0

Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote attackers to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data. Desbordamiento de búfer basado en el montón en la librería de decodificación ASN.1 de productos CheckPoint VPN-1, cuando se ha implementado IKE agresivo, permite a atacantes remotos ejecutar código de su elección iniciando una negociación IKE y enviando un paquete IKE con datos ASN.1 malformados. • http://secunia.com/advisories/12177 http://securitytracker.com/alerts/2004/Jul/1010799.html http://www.checkpoint.com/techsupport/alerts/asn1.html http://www.ciac.org/ciac/bulletins/o-190.shtml http://www.kb.cert.org/vuls/id/435358 http://www.osvdb.org/displayvuln.php?osvdb_id=8290 http://www.securityfocus.com/bid/10820 http://xforce.iss.net/xforce/alerts/id/178 https://exchange.xforce.ibmcloud.com/vulnerabilities/16824 •

CVSS: 5.0EPSS: 0%CPEs: 252EXPL: 0

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. OpenSSL 0.9.6 anteriores a la 0.9.6d no manejan adecuadamente los tipos de mensajes desconocidos, lo que permite a atacantes remotos causar una denegación de servicios (por bucle infinito), como se demuestra utilizando la herramienta de testeo Codenomicon TLS. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 http://fedoranews.org/updates/FEDORA-2004-095.shtml http://marc.info/?l=bugtraq&m=107955049331965&w=2 http://marc.info/?l=bugtraq&m=108403850228012&w=2 http://rhn.redhat.com/errata/RHSA-2004-119.html http://secunia.com/advisories/11139 http://security.gen •

CVSS: 5.0EPSS: 0%CPEs: 245EXPL: 0

The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read. El código que une SSL/TLS en OpenSSL 0.9.7a, 0.9.7b y 0.9.7c, usando Kerberos, no comprueba adecuadamente la longitud de los tickets de Kerberos, lo que permite que atacantes remotos provoquen una denegación de servicio. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 http://docs.info.apple.com/article.html?artnum=61798 http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://lists.apple.com/mhonarc/security-announce/msg00045.html http: • CWE-125: Out-of-bounds Read •