Page 6 of 123 results (0.010 seconds)

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

22 Jan 2014 — Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle attackers to spoof SSL servers by presenting an arbitrary certificate during a session established by a client. Check Point Endpoint Security MI Server hasta la versión R73 3.0.0 HFA2.5 no configura la validación del certificado X.509 para dispositivos cliente, lo que permite a atacantes man-in-the-middle falsificar servidores SSL presentando un ... • http://secunia.com/advisories/56744 • CWE-310: Cryptographic Issues •

CVSS: 6.8EPSS: 0%CPEs: 7EXPL: 0

14 Nov 2013 — Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously. Media Encryption EPM Explorer en Check Point Endpoint Security hasta la versión E80.50 no mantiene adecuadamente el estado de fallos en contraseñas, lo que hace más senc... • http://www.digitalsec.net/stuff/explt+advs/CheckPoint_EndPoint_EPM_Explorer.txt • CWE-255: Credentials Management Errors •

CVSS: 6.8EPSS: 0%CPEs: 7EXPL: 0

14 Nov 2013 — Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses. Unlock.exe en Media Encryption EPM Explorer de Check Point Endpoint Security hasta la versión E80.50 no asocia fallos en la introducción de contraseña junto a un identificador de... • http://www.digitalsec.net/stuff/explt+advs/CheckPoint_EndPoint_EPM_Explorer.txt • CWE-255: Credentials Management Errors •

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

25 Aug 2012 — Race condition in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has ... • http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

19 Jun 2012 — Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory. Vulnerabilidad de ruta de búsqueda no confiable en TrGUI.exe en el Endpoint Connect (aka EPC) GUI en Check Point Endpoint Security R73.x y E80.x en la plataforma VPN blade... • http://archives.neohapsis.com/archives/bugtraq/2012-06/0069.html •

CVSS: 9.8EPSS: 4%CPEs: 8EXPL: 0

05 Oct 2011 — Multiple unspecified vulnerabilities in Check Point SSL Network Extender (SNX), SecureWorkSpace, and Endpoint Security On-Demand, as distributed by SecurePlatform, IPSO6, Connectra, and VSX, allow remote attackers to execute arbitrary code via vectors involving a (1) ActiveX control or (2) Java applet. Múltiples vulnerabilidades sin especificar en Check Point SSL Network Extender (SNX), SecureWorkSpace y Endpoint Security On-Demand, como se distribuye en SecurePlatform, IPSO6, Connectra and VSX. Permite a a... • http://www.securityfocus.com/bid/47695 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

08 Jul 2011 — Unspecified vulnerability in Check Point Multi-Domain Management / Provider-1 NGX R65, R70, R71, and R75, and SmartCenter during installation on non-Windows machines, allows local users on the MDS system to overwrite arbitrary files via unknown vectors. Vulnerabilidad no especificada en Multi-Domain Management / Provider-1 NGX R65, R70, R71, y R75, y SmartCenter durante la instalación en máquinas no Windows, permite a usuarios locales en el sistema MDS sobrescribir archivos de su elección a través de vector... • http://secunia.com/advisories/45231 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

21 Aug 2009 — TrueVector in Check Point ZoneAlarm 8.0.020.000, with vsmon.exe running, allows remote HTTP proxies to cause a denial of service (crash) and disable the HIDS module via a crafted response. TrueVector en Check Point ZoneAlarm v8.0.020.000, con vsmon.exe en ejecución, permite a proxies HTTP remotos provocar una denegación de servicio (caída) y deshabilitar el módulo HIDS mediante una respuesta manipulada. • https://www.exploit-db.com/exploits/32428 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 2

19 Aug 2009 — Buffer overflow in multiscan.exe in Check Point ZoneAlarm Security Suite 7.0.483.000 and 8.0.020.000 allows local users to execute arbitrary code via a file or directory with a long path. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer en multiscan.exe en Check Point ZoneAlarm Security Suite v7.0.483.000 y v8.0.020.000 permite a usuarios locales ejecutar código de forma arbitraria a través de un fichero o directorio con una ruta larga. NOTA: Algunos de estos de... • https://www.exploit-db.com/exploits/32356 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 4

02 Apr 2009 — NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HTTP header to TCP port 18624. NOTE: the vendor has disputed this issue, stating "Check Point Security Alert Team has analyzed this report. We've tried to reproduce the attack on all VPN-1 versions from NG FP2 and above with and without HFA... • https://www.exploit-db.com/exploits/8313 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •