Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint firewall-1 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and previous versions generates different error messages for invalid usernames versus invalid passwords, which allows remote malicious users to identify valid usernames on the firewall.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
NA
CVE-2002-1623
The design of the Internet Key Exchange (IKE) protocol, when using Aggressive Mode for shared secret authentication, does not encrypt initiator or responder identities during negotiation, which may allow remote malicious users to determine valid usernames by (1) monitoring respon...
Checkpoint Vpn-1 Firewall-1 4.0
Checkpoint Vpn-1 Firewall-1 4.1
NA
CVE-1999-0895
Firewall-1 does not properly restrict access to LDAP attributes.
Checkpoint Firewall-1 4.0
NA
CVE-2002-0428
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
Checkpoint Firewall-1 4.0
Checkpoint Check Point Vpn 1 4.1
Checkpoint Check Point Vpn 1 4.1 Sp1
Checkpoint Check Point Vpn 1 4.1 Sp2
Checkpoint Check Point Vpn 1 4.1 Sp3
Checkpoint Firewall-1 4.1
Checkpoint Check Point Vpn 1 4.1 Sp4
Checkpoint Next Generation
NA
CVE-2001-1171
Check Point Firewall-1 3.0b up to and including 4.0 SP1 follows symlinks and creates a world-writable temporary .cpp file when compiling Policy rules, which could allow local users to gain privileges or modify the firewall policy.
Checkpoint Firewall-1 3.0b
NA
CVE-2000-0150
Check Point Firewall-1 allows remote malicious users to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt.
Checkpoint Firewall-1 3.0
Cisco Pix Firewall Software 4.1\\(6\\)
Cisco Pix Firewall Software 4.2\\(1\\)
Cisco Pix Firewall Software 4.2\\(2\\)
Cisco Pix Firewall Software 4.3
Cisco Pix Firewall Software 4.4\\(4\\)
Checkpoint Firewall-1 4.0
Cisco Pix Firewall Software 4.1\\(6b\\)
Cisco Pix Firewall Software 5.0
NA
CVE-2004-0112
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshak...
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
7.5
CVSSv3
CVE-2004-0079
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
NA
CVE-2004-0081
OpenSSL 0.9.6 prior to 0.9.6d does not properly handle unknown message types, which allows remote malicious users to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1 \\(3.005\\)
Cisco Firewall Services Module
Cisco Firewall Services Module 1.1.2
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Hp Aaa Server
Cisco Ciscoworks Common Management Foundation 2.1
Cisco Ciscoworks Common Services 2.2
Avaya Sg208 4.4
Avaya Sg5 4.2
Avaya Sg5 4.3
Freebsd Freebsd 5.1
Hp Hp-ux 8.05
Openbsd Openbsd 3.3
Redhat Linux 8.0
Sco Openserver 5.0.6
Avaya Sg203 4.4
Avaya Sg208
Freebsd Freebsd 4.8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3