Page 2 of 21 results (0.005 seconds)

CVSS: 6.4EPSS: 0%CPEs: 5EXPL: 0

The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack. • http://www.securityfocus.com/archive/1/212826 http://www.securityfocus.com/bid/3303 https://exchange.xforce.ibmcloud.com/vulnerabilities/7095 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall. • http://www.osvdb.org/1632 http://www.securityfocus.com/archive/1/142808 http://www.securityfocus.com/bid/1890 https://exchange.xforce.ibmcloud.com/vulnerabilities/5816 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 3

Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. • https://www.exploit-db.com/exploits/20215 https://www.exploit-db.com/exploits/20216 http://www.securityfocus.com/archive/1/76389 http://www.securityfocus.com/bid/1662 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to cause a denial of service. • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Getkey_Buffer http://www.osvdb.org/4422 https://exchange.xforce.ibmcloud.com/vulnerabilities/5139 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#One-way_Connection http://www.osvdb.org/4419 https://exchange.xforce.ibmcloud.com/vulnerabilities/5468 •