Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint check point vpn 1 4.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0428
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
Checkpoint Firewall-1 4.0
Checkpoint Check Point Vpn 1 4.1
Checkpoint Check Point Vpn 1 4.1 Sp1
Checkpoint Check Point Vpn 1 4.1 Sp2
Checkpoint Check Point Vpn 1 4.1 Sp3
Checkpoint Firewall-1 4.1
Checkpoint Check Point Vpn 1 4.1 Sp4
Checkpoint Next Generation
10
CVSSv2
CVE-2004-0040
Stack-based buffer overflow in Check Point VPN-1 Server 4.1 up to and including 4.1 SP6 and Check Point SecuRemote/SecureClient 4.1 up to and including 4.1 build 4200 allows remote malicious users to execute arbitrary code via an ISAKMP packet with a large Certificate Request pac...
Checkpoint Firewall-1 4.1
Checkpoint Vpn-1 Next Generation Fp0
Checkpoint Vpn-1 Next Generation Fp1
Checkpoint Firewall-1 Next Generation Fp1
Checkpoint Vpn-1 4.1
Checkpoint Firewall-1 Next Generation Fp0
7.5
CVSSv2
CVE-2004-0699
Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote malicious users to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.
Checkpoint Firewall-1 4.1
Checkpoint Vpn-1
6.5
CVSSv2
CVE-2005-4093
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote malicious users to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
Checkpoint Secureclient Ng R56
Checkpoint Vpn-1 Secureclient 4.1
Checkpoint Secureclient Ng
Checkpoint Vpn-1 Secureclient 4.0
1 EDB exploit
7.2
CVSSv2
CVE-2006-0255
Unquoted Windows search path vulnerability in Check Point VPN-1 SecureClient might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run when SecureClient attempts to launch the Sr_GUI.exe program.
Checkpoint Vpn-1
Checkpoint Vpn-1 4.1
7.5
CVSSv2
CVE-2001-1176
Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection.
Checkpoint Firewall-1 4.1
Checkpoint Vpn-1 4.1
Checkpoint Provider-1 4.1
7.5
CVSSv2
CVE-2001-1158
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote malicious users to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.1 Build 41439
5
CVSSv2
CVE-2001-1499
Check Point VPN-1 4.1SP4 using SecuRemote returns different error messages for valid and invalid users, with prompts that vary depending on the authentication method being used, which makes it easier for remote malicious users to conduct brute force attacks.
Checkpoint Vpn-1 4.1
7.5
CVSSv2
CVE-2001-0082
Check Point VPN-1/FireWall-1 4.1 SP2 with Fastmode enabled allows remote malicious users to bypass access restrictions via malformed, fragmented packets.
Checkpoint Firewall-1 4.1
1 EDB exploit
7.5
CVSSv2
CVE-2000-0804
Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass."
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »