Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall-1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2006-3885
Directory traversal vulnerability in Check Point Firewall-1 R55W before HFA03 allows remote malicious users to read arbitrary files via an encoded .. (dot dot) in the URL on TCP port 18264.
Checkpoint Firewall-1 R55w
7.5
CVSSv2
CVE-2001-0082
Check Point VPN-1/FireWall-1 4.1 SP2 with Fastmode enabled allows remote malicious users to bypass access restrictions via malformed, fragmented packets.
Checkpoint Firewall-1 4.1
1 EDB exploit
7.2
CVSSv2
CVE-2001-1171
Check Point Firewall-1 3.0b up to and including 4.0 SP1 follows symlinks and creates a world-writable temporary .cpp file when compiling Policy rules, which could allow local users to gain privileges or modify the firewall policy.
Checkpoint Firewall-1 3.0b
5
CVSSv2
CVE-2001-0182
FireWall-1 4.1 with a limited-IP license allows remote malicious users to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources.
Checkpoint Firewall-1 4.1
7.5
CVSSv2
CVE-1999-0895
Firewall-1 does not properly restrict access to LDAP attributes.
Checkpoint Firewall-1 4.0
10
CVSSv2
CVE-2009-1227
NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HT...
Checkpoint Firewall-1 Pki Web Service -
1 EDB exploit
7.5
CVSSv2
CVE-2004-0699
Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote malicious users to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.
Checkpoint Firewall-1 4.1
Checkpoint Vpn-1
7.5
CVSSv2
CVE-2001-1176
Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection.
Checkpoint Firewall-1 4.1
Checkpoint Vpn-1 4.1
Checkpoint Provider-1 4.1
7.5
CVSSv2
CVE-2002-0428
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
Checkpoint Firewall-1 4.0
Checkpoint Check Point Vpn 1 4.1
Checkpoint Check Point Vpn 1 4.1 Sp1
Checkpoint Check Point Vpn 1 4.1 Sp2
Checkpoint Check Point Vpn 1 4.1 Sp3
Checkpoint Firewall-1 4.1
Checkpoint Check Point Vpn 1 4.1 Sp4
Checkpoint Next Generation
9.3
CVSSv2
CVE-2011-1827
Multiple unspecified vulnerabilities in Check Point SSL Network Extender (SNX), SecureWorkSpace, and Endpoint Security On-Demand, as distributed by SecurePlatform, IPSO6, Connectra, and VSX, allow remote malicious users to execute arbitrary code via vectors involving a (1) Active...
Checkpoint Connectra Ngx R66.1
Checkpoint Vpn-1 Firewall-1 Vsx R65.20
Checkpoint Vpn-1 R65.70
Checkpoint Vpn-1 R70.40
Checkpoint Vpn-1 R71.30
Checkpoint Vpn-1 R75
Checkpoint Connectra Ngx R66.1n
Checkpoint Vpn-1 Firewall-1 Vsx R67
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »