4 results (0.007 seconds)

CVSS: 9.3EPSS: 4%CPEs: 8EXPL: 0

Multiple unspecified vulnerabilities in Check Point SSL Network Extender (SNX), SecureWorkSpace, and Endpoint Security On-Demand, as distributed by SecurePlatform, IPSO6, Connectra, and VSX, allow remote attackers to execute arbitrary code via vectors involving a (1) ActiveX control or (2) Java applet. Múltiples vulnerabilidades sin especificar en Check Point SSL Network Extender (SNX), SecureWorkSpace y Endpoint Security On-Demand, como se distribuye en SecurePlatform, IPSO6, Connectra and VSX. Permite a atacantes remotos ejecutar código arbitrario a través de vectores que involucran un (1) control ActiveX o (2) applet de Java. • http://www.securityfocus.com/bid/47695 http://www.vupen.com/english/advisories/2011/1162 https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk62410 https://www.sec-consult.com/en/advisories.html#a68 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in index.php in Check Point Connectra NGX R62 HFA_01 allows remote attackers to inject arbitrary web script or HTML via the dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php de Check Point Connectra NGX R62 HFA_01, permite a atacantes remotos inyectar secuencias de comandos Web o HTML de su elección a través del parámetro dir. NOTA: información de origen desconocido; los detalles se han obtenido únicamente de fuentes de terceros. • http://secunia.com/advisories/31553 http://www.securityfocus.com/bid/31369 https://exchange.xforce.ibmcloud.com/vulnerabilities/45385 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 55%CPEs: 1EXPL: 1

sre/params.php in the Integrity Clientless Security (ICS) component in Check Point Connectra NGX R62 3.x and earlier before Security Hotfix 5, and possibly VPN-1 NGX R62, allows remote attackers to bypass security requirements via a crafted Report parameter, which returns a valid ICSCookie authentication token. El archivo sre/params.php en el componente Integrity Clientless Security (ICS) en Check Point Connectra NGX R62 versión 3.x y anteriores a Security Hotfix versión 5, y posiblemente VPN-1 NGX R62, permite a los atacantes remotos omitir los requisitos de seguridad por medio de un parámetro Report creado, que devuelve un token de autenticación ICSCookie válido. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051920.html http://osvdb.org/31655 http://secunia.com/advisories/23847 http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472 http://securityreason.com/securityalert/2179 http://securitytracker.com/id?1017559 http://securitytracker.com/id?1017560 http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html http://w • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Check Point NGX R60 does not properly verify packets against the predefined service group "CIFS" rule, which allows remote attackers to bypass intended restrictions. • http://marc.info/?l=bugtraq&m=112611529724821&w=2 http://www.kb.cert.org/vuls/id/508209 •