Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint firewall-1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-1102
Check Point FireWall-1 3.0b up to and including 4.1 for Solaris allows local users to overwrite arbitrary files via a symlink attack on temporary policy files that end in a .cpp extension, which are set world-writable.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
NA
CVE-2001-1101
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b up to and including 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log'...
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
NA
CVE-2000-1201
Check Point FireWall-1 allows remote malicious users to cause a denial of service (high CPU) via a flood of packets to port 264.
Checkpoint Firewall-1
NA
CVE-2001-1303
The default configuration of SecuRemote for Check Point Firewall-1 allows remote malicious users to obtain sensitive configuration information for the protected network without authentication.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
1 EDB exploit
NA
CVE-2001-1176
Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection.
Checkpoint Provider-1 4.1
Checkpoint Firewall-1 4.1
Checkpoint Vpn-1 4.1
NA
CVE-2001-1158
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote malicious users to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
Checkpoint Firewall-1 4.1 Build 41439
Checkpoint Firewall-1 4.1
NA
CVE-2001-0182
FireWall-1 4.1 with a limited-IP license allows remote malicious users to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources.
Checkpoint Firewall-1 4.1
NA
CVE-2001-0082
Check Point VPN-1/FireWall-1 4.1 SP2 with Fastmode enabled allows remote malicious users to bypass access restrictions via malformed, fragmented packets.
Checkpoint Firewall-1 4.1
1 EDB exploit
NA
CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and previous versions generates different error messages for invalid usernames versus invalid passwords, which allows remote malicious users to identify valid usernames on the firewall.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
NA
CVE-2000-1037
Check Point Firewall-1 session agent 3.0 up to and including 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote malicious users to determine valid usernames and guess a password via a brute force attack.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »