
CVE-2014-8951
https://notcve.org/view.php?id=CVE-2014-8951
16 Nov 2014 — Unspecified vulnerability in Check Point Security Gateway R75, R76, R77, and R77.10, when UserCheck is enabled and the (1) Application Control, (2) URL Filtering, (3) DLP, (4) Threat Emulation, (5) Anti-Bot, or (6) Anti-Virus blade is used, allows remote attackers to cause a denial of service (fwk0 process crash, core dump, and restart) via a redirect to the UserCheck page. Una vulnerabilidad sin especificar en Check Point Security Gateway R75, R76, R77, y R77.10, cuando el UserCheck está activado y (1) App... • http://secunia.com/advisories/58487 •

CVE-2014-7169 – GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2014-7169
25 Sep 2014 — GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a ... • https://packetstorm.news/files/id/128650 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-228: Improper Handling of Syntactically Invalid Structure •

CVE-2014-6271 – GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2014-6271
24 Sep 2014 — GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." N... • https://packetstorm.news/files/id/181111 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2013-7350
https://notcve.org/view.php?id=CVE-2013-7350
01 Apr 2014 — Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to "important security fixes." Múltiples vulnerabilidades no especificadas en Check Point Security Gateway 80 R71.x anterior a R71.45 (730159141) y R75.20.x anterior a R75.20.4 y aplicaciones 600 y 1100 R75.20.x anterior a R75.20.42 tienen impacto desconocido y vectores de ataq... • http://osvdb.org/102745 •

CVE-2014-1672
https://notcve.org/view.php?id=CVE-2014-1672
26 Jan 2014 — Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing when the routing table is modified and the "Get - Interfaces with Topology" action is performed, which allows attackers to bypass intended access restrictions. Check Point R75.47 Security Gateway y Management Server no fuerzan apropiadamente Anti-Spoofing cuando la tabla de rutas es modificada y la se ejecuta la acción "Get Interfaces with Topology", lo cual permite a atacantes sortear restricciones de acceso. • https://exchange.xforce.ibmcloud.com/vulnerabilities/90976 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2014-1673 – Check Point Session Authentication Agent 4.1 Missing Authentication
https://notcve.org/view.php?id=CVE-2014-1673
26 Jan 2014 — Check Point Session Authentication Agent allows remote attackers to obtain sensitive information (user credentials) via unspecified vectors. Check Point Session Authentication Agent permite a atacantes remotos obtener información sensible (credenciales de usuario) a través de vectores no especificados. • https://packetstorm.news/files/id/124967 •

CVE-2013-7311
https://notcve.org/view.php?id=CVE-2013-7311
23 Jan 2014 — The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. La implementación OSPF en Check Point Gaia OS R75.X y R76 e IPSO OS 6.2 R75.X y R7... • http://www.kb.cert.org/vuls/id/229804 •

CVE-2013-7304
https://notcve.org/view.php?id=CVE-2013-7304
22 Jan 2014 — Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle attackers to spoof SSL servers by presenting an arbitrary certificate during a session established by a client. Check Point Endpoint Security MI Server hasta la versión R73 3.0.0 HFA2.5 no configura la validación del certificado X.509 para dispositivos cliente, lo que permite a atacantes man-in-the-middle falsificar servidores SSL presentando un ... • http://secunia.com/advisories/56744 • CWE-310: Cryptographic Issues •

CVE-2013-5635 – Checkpoint Endpoint Security Media Encryption EPM Explorer Bypass
https://notcve.org/view.php?id=CVE-2013-5635
14 Nov 2013 — Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously. Media Encryption EPM Explorer en Check Point Endpoint Security hasta la versión E80.50 no mantiene adecuadamente el estado de fallos en contraseñas, lo que hace más senc... • http://www.digitalsec.net/stuff/explt+advs/CheckPoint_EndPoint_EPM_Explorer.txt • CWE-255: Credentials Management Errors •

CVE-2013-5636 – Checkpoint Endpoint Security Media Encryption EPM Explorer Bypass
https://notcve.org/view.php?id=CVE-2013-5636
14 Nov 2013 — Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses. Unlock.exe en Media Encryption EPM Explorer de Check Point Endpoint Security hasta la versión E80.50 no asocia fallos en la introducción de contraseña junto a un identificador de... • http://www.digitalsec.net/stuff/explt+advs/CheckPoint_EndPoint_EPM_Explorer.txt • CWE-255: Credentials Management Errors •