Page 11 of 123 results (0.004 seconds)

CVSS: 8.8EPSS: 2%CPEs: 11EXPL: 0

12 Jul 2001 — Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0209.html •

CVSS: 9.1EPSS: 4%CPEs: 3EXPL: 0

09 Jul 2001 — Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0128.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

26 Mar 2001 — FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources. • http://archives.neohapsis.com/archives/bugtraq/2001-01/0298.html •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

02 Feb 2001 — Check Point VPN-1/FireWall-1 4.1 SP2 with Fastmode enabled allows remote attackers to bypass access restrictions via malformed, fragmented packets. • https://www.exploit-db.com/exploits/20519 •

CVSS: 5.3EPSS: 1%CPEs: 2EXPL: 2

11 Dec 2000 — The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall. • http://www.osvdb.org/1632 •

CVSS: 7.5EPSS: 7%CPEs: 3EXPL: 3

29 Nov 2000 — Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. • https://www.exploit-db.com/exploits/20215 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#One-way_Connection •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — Check Point VPN-1/FireWall-1 4.1 and earlier improperly retransmits encapsulated FWS packets, even if they do not come from a valid FWZ client, aka "Retransmission of Encapsulated Packets." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Inter-module_Communications •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to spoof connections, aka the "OPSEC Authentication Vulnerability." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#OPSEC_Authentication •