Page 2 of 22 results (0.022 seconds)

CVSS: 6.4EPSS: 0%CPEs: 5EXPL: 0

The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack. • http://www.securityfocus.com/archive/1/212826 http://www.securityfocus.com/bid/3303 https://exchange.xforce.ibmcloud.com/vulnerabilities/7095 •

CVSS: 6.2EPSS: 0%CPEs: 4EXPL: 0

Check Point FireWall-1 3.0b through 4.1 for Solaris allows local users to overwrite arbitrary files via a symlink attack on temporary policy files that end in a .cpp extension, which are set world-writable. • http://www.securityfocus.com/archive/1/212824 http://www.securityfocus.com/bid/3300 https://exchange.xforce.ibmcloud.com/vulnerabilities/7094 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall. • http://www.osvdb.org/1632 http://www.securityfocus.com/archive/1/142808 http://www.securityfocus.com/bid/1890 https://exchange.xforce.ibmcloud.com/vulnerabilities/5816 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 3

Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. • https://www.exploit-db.com/exploits/20215 https://www.exploit-db.com/exploits/20216 http://www.securityfocus.com/archive/1/76389 http://www.securityfocus.com/bid/1662 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Inter-module_Communications http://www.osvdb.org/4413 https://exchange.xforce.ibmcloud.com/vulnerabilities/5162 •