Page 9 of 47 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote attackers to determine the real IP address of the host that is making the connection. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0119.html http://www.osvdb.org/1256 http://www.securityfocus.com/bid/1054 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt. • http://www.kb.cert.org/vuls/id/328867 http://www.osvdb.org/4417 http://www.securityfocus.com/bid/979 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag. • https://www.exploit-db.com/exploits/19732 http://www.osvdb.org/1212 http://www.securityfocus.com/bid/954 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Firewall-1 does not properly restrict access to LDAP attributes. • http://www.osvdb.org/1117 http://www.securityfocus.com/bid/725 http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991020150002.21047.qmail%40tarjan.mediaways.net •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host. • http://www.osvdb.org/1038 http://www.securityfocus.com/archive/1/23615 http://www.securityfocus.com/bid/576 •