Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint firewall-1 4.0 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2004-2679
Check Point Firewall-1 4.1 up to NG AI R55 allows remote malicious users to obtain potentially sensitive information by sending an Internet Key Exchange (IKE) with a certain Vendor ID payload that causes Firewall-1 to return a response containing version and other information.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 R55
7.5
CVSSv2
CVE-2002-0428
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
Checkpoint Check Point Vpn 1 4.1 Sp1
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
Checkpoint Check Point Vpn 1 4.1 Sp4
Checkpoint Check Point Vpn 1 4.1 Sp2
Checkpoint Check Point Vpn 1 4.1
Checkpoint Check Point Vpn 1 4.1 Sp3
Checkpoint Next Generation
7.5
CVSSv2
CVE-2001-0940
Buffer overflow in the GUI authentication code of Check Point VPN-1/FireWall-1 Management Server 4.0 and 4.1 allows remote malicious users to execute arbitrary code via a long user name.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
7.5
CVSSv2
CVE-2000-1037
Check Point Firewall-1 session agent 3.0 up to and including 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote malicious users to determine valid usernames and guess a password via a brute force attack.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
2 EDB exploits
7.5
CVSSv2
CVE-2000-0804
Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass."
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
7.5
CVSSv2
CVE-2000-0805
Check Point VPN-1/FireWall-1 4.1 and previous versions improperly retransmits encapsulated FWS packets, even if they do not come from a valid FWZ client, aka "Retransmission of Encapsulated Packets."
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
7.5
CVSSv2
CVE-2000-0807
The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to spoof connections, aka the "OPSEC Authentication Vulnerability."
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
7.5
CVSSv2
CVE-2000-0808
The seed generation mechanism in the inter-module S/Key authentication mechanism in Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to bypass authentication via a brute force attack, aka "One-time (s/key) Password Authentication."
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
7.5
CVSSv2
CVE-2000-0779
Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote malicious users to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
7.5
CVSSv2
CVE-2000-0150
Check Point Firewall-1 allows remote malicious users to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Cisco Pix Firewall Software 4.1(6)
Cisco Pix Firewall Software 4.1(6b)
Cisco Pix Firewall Software 4.3
Cisco Pix Firewall Software 4.2(1)
Cisco Pix Firewall Software 4.4(4)
Cisco Pix Firewall Software 4.2(2)
Cisco Pix Firewall Software 5.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »