CVE-2001-1303 – Check Point Firewall-1 4 Securemote - Network Information Leak
https://notcve.org/view.php?id=CVE-2001-1303
The default configuration of SecuRemote for Check Point Firewall-1 allows remote attackers to obtain sensitive configuration information for the protected network without authentication. • https://www.exploit-db.com/exploits/21015 http://www.osvdb.org/588 http://www.securityfocus.com/archive/1/197566 http://www.securityfocus.com/bid/3058 https://exchange.xforce.ibmcloud.com/vulnerabilities/6857 •
CVE-2000-1032
https://notcve.org/view.php?id=CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall. • http://www.osvdb.org/1632 http://www.securityfocus.com/archive/1/142808 http://www.securityfocus.com/bid/1890 https://exchange.xforce.ibmcloud.com/vulnerabilities/5816 •
CVE-2000-1037 – Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack
https://notcve.org/view.php?id=CVE-2000-1037
Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. • https://www.exploit-db.com/exploits/20215 https://www.exploit-db.com/exploits/20216 http://www.securityfocus.com/archive/1/76389 http://www.securityfocus.com/bid/1662 •
CVE-2000-0806
https://notcve.org/view.php?id=CVE-2000-0806
The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Inter-module_Communications http://www.osvdb.org/4413 https://exchange.xforce.ibmcloud.com/vulnerabilities/5162 •
CVE-2000-0805
https://notcve.org/view.php?id=CVE-2000-0805
Check Point VPN-1/FireWall-1 4.1 and earlier improperly retransmits encapsulated FWS packets, even if they do not come from a valid FWZ client, aka "Retransmission of Encapsulated Packets." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of http://www.osvdb.org/4415 https://exchange.xforce.ibmcloud.com/vulnerabilities/5469 •