Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2021-30361
The Check Point Gaia Portal's GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS.
Checkpoint Gaia Portal
Checkpoint Gaia Os -
6.9
CVSSv2
CVE-2008-7009
Buffer overflow in multiscan.exe in Check Point ZoneAlarm Security Suite 7.0.483.000 and 8.0.020.000 allows local users to execute arbitrary code via a file or directory with a long path. NOTE: some of these details are obtained from third party information.
Checkpoint Zonealarm 7.0.483.000
Checkpoint Zonealarm 8.0.020.000
1 EDB exploit
6
CVSSv2
CVE-2021-30358
Mobile Access Portal Native Applications who's path is defined by the administrator with environment variables may run applications from other locations by the Mobile Access Portal Agent.
Checkpoint Mobile Access Portal Agent R80.20
Checkpoint Mobile Access Portal Agent R80.30
Checkpoint Mobile Access Portal Agent R80.40
Checkpoint Mobile Access Portal Agent R81
Checkpoint Mobile Access Portal Agent R81.10
6.5
CVSSv2
CVE-2008-1397
Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one...
Checkpoint Check Point Vpn-1 Pro Ngx R62 Ga
Checkpoint Vpn-1 Ngx R60
Checkpoint Vpn-1 Firewall-1 Ng Ai R55
Checkpoint Vpn-1 Power Utm Ngx R65 With Messaging Security
Checkpoint Vpn-1 Power Utm With Ngx R65
Checkpoint Check Point Vpn-1 Pro Ngx R61
7.2
CVSSv2
CVE-2006-0255
Unquoted Windows search path vulnerability in Check Point VPN-1 SecureClient might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run when SecureClient attempts to launch the Sr_GUI.exe program.
Checkpoint Vpn-1
Checkpoint Vpn-1 4.1
7.5
CVSSv2
CVE-2004-0699
Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote malicious users to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.
Checkpoint Firewall-1 4.1
Checkpoint Vpn-1
4.9
CVSSv2
CVE-2002-2405
Check Point FireWall-1 4.1 and Next Generation (NG), with UserAuth configured to proxy HTTP traffic only, allows remote malicious users to pass unauthorized HTTPS, FTP and possibly other traffic through the firewall.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 Ng
4
CVSSv2
CVE-2014-1672
Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing when the routing table is modified and the "Get - Interfaces with Topology" action is performed, which allows malicious users to bypass intended access restrictions.
Checkpoint Security Gateway R75.47
Checkpoint Management Server R75.47
5
CVSSv2
CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and previous versions generates different error messages for invalid usernames versus invalid passwords, which allows remote malicious users to identify valid usernames on the firewall.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
5
CVSSv2
CVE-2008-5849
Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote malicious users to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response contain...
Checkpoint Vpn-1 R55
Checkpoint Vpn-1 R65
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »