Page 3 of 13 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 21EXPL: 1

Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file. • http://online.securityfocus.com/archive/1/260662 http://www.iss.net/security_center/static/8423.php http://www.securityfocus.com/bid/4253 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Nokia Firewall Appliances running IPSO 3.3 and VPN-1/FireWall-1 4.1 Service Pack 3, IPSO 3.4 and VPN-1/FireWall-1 4.1 Service Pack 4, and IPSO 3.4 or IPSO 3.4.1 and VPN-1/FireWall-1 4.1 Service Pack 5, when SYN Defender is configured in Active Gateway mode, does not properly rewrite the third packet of a TCP three-way handshake to use the NAT IP address, which allows remote attackers to gain sensitive information. • http://www.kb.cert.org/vuls/id/258731 https://exchange.xforce.ibmcloud.com/vulnerabilities/8293 •

CVSS: 7.5EPSS: 1%CPEs: 11EXPL: 0

Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0209.html http://www.checkpoint.com/techsupport/alerts/format_strings.html http://www.osvdb.org/1901 http://www.securityfocus.com/bid/3021 https://exchange.xforce.ibmcloud.com/vulnerabilities/6849 •