Page 6 of 47 results (0.001 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0128.html http://ciac.llnl.gov/ciac/bulletins/l-109.shtml http://online.securityfocus.com/cgi-bin/archive.pl?id=1&start=2002-03-11&end=2002-03-17&mid=195647&threads=1 http://www.cert.org/advisories/CA-2001-17.html http://www.checkpoint.com/techsupport/alerts/rdp.html http://www.kb.cert.org/vuls/id/310295 http://www.osvdb.org/1884 http://www.securityfocus.com/bid/2952 https://exchange.xforce.ibmcloud.com/ •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources. • http://archives.neohapsis.com/archives/bugtraq/2001-01/0298.html http://www.osvdb.org/1733 http://www.securityfocus.com/bid/2238 https://exchange.xforce.ibmcloud.com/vulnerabilities/5966 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Check Point VPN-1/FireWall-1 4.1 SP2 with Fastmode enabled allows remote attackers to bypass access restrictions via malformed, fragmented packets. • https://www.exploit-db.com/exploits/20519 http://archives.neohapsis.com/archives/bugtraq/2000-12/0271.html •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall. • http://www.osvdb.org/1632 http://www.securityfocus.com/archive/1/142808 http://www.securityfocus.com/bid/1890 https://exchange.xforce.ibmcloud.com/vulnerabilities/5816 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 3

Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. • https://www.exploit-db.com/exploits/20215 https://www.exploit-db.com/exploits/20216 http://www.securityfocus.com/archive/1/76389 http://www.securityfocus.com/bid/1662 •