Page 4 of 47 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#One-way_Connection •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — Check Point VPN-1/FireWall-1 4.1 and earlier improperly retransmits encapsulated FWS packets, even if they do not come from a valid FWZ client, aka "Retransmission of Encapsulated Packets." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Inter-module_Communications •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to spoof connections, aka the "OPSEC Authentication Vulnerability." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#OPSEC_Authentication •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — The seed generation mechanism in the inter-module S/Key authentication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass authentication via a brute force attack, aka "One-time (s/key) Password Authentication." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#One-time_Password •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to cause a denial of service. • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Getkey_Buffer •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2000 — Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to redirect FTP connections to other servers ("FTP Bounce") via invalid FTP commands that are processed improperly by FireWall-1, aka "FTP Connection Enforcement Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#FTP_Connection •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

13 Oct 2000 — Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote attackers to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests. • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Improper_stderr •

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 1

30 Jun 2000 — Check Point FireWall-1 4.0 and 4.1 allows remote attackers to cause a denial of service by sending a stream of invalid commands (such as binary zeros) to the SMTP Security Server proxy. • https://www.exploit-db.com/exploits/20049 •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 2

06 Jun 2000 — Check Point Firewall-1 allows remote attackers to cause a denial of service by sending a large number of malformed fragmented IP packets. • https://www.exploit-db.com/exploits/19994 •