Page 2 of 21 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Inter-module_Communications •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to spoof connections, aka the "OPSEC Authentication Vulnerability." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#OPSEC_Authentication •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — The seed generation mechanism in the inter-module S/Key authentication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass authentication via a brute force attack, aka "One-time (s/key) Password Authentication." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#One-time_Password •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to cause a denial of service. • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Getkey_Buffer •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to redirect FTP connections to other servers ("FTP Bounce") via invalid FTP commands that are processed improperly by FireWall-1, aka "FTP Connection Enforcement Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#FTP_Connection •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

13 Oct 2000 — Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote attackers to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests. • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Improper_stderr •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

11 Mar 2000 — Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote attackers to determine the real IP address of the host that is making the connection. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0119.html •

CVSS: 9.1EPSS: 0%CPEs: 9EXPL: 0

12 Feb 2000 — Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt. • http://www.kb.cert.org/vuls/id/328867 •

CVSS: 9.1EPSS: 3%CPEs: 1EXPL: 1

29 Jan 2000 — Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag. • https://www.exploit-db.com/exploits/19732 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

09 Aug 1999 — Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host. • http://www.osvdb.org/1038 •