CVE-2005-4093 – Check Point VPN-1 SecureClient 4.0 < 4.1 - Policy Bypass
https://notcve.org/view.php?id=CVE-2005-4093
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint. • https://www.exploit-db.com/exploits/26754 http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html http://secunia.com/advisories/17837 http://secunia.com/advisories/23395 http://securitytracker.com/id?1015326 http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html http://www.securityfocus.com/bid/15757 http://www.us.debian.org/security/2006/dsa-1237 http://www.vupen.com/english& • CWE-264: Permissions, Privileges, and Access Controls •