Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-7350
Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to "important security fixes."
Checkpoint Security Gateway R75.20
Checkpoint Security Gateway R71.00
Checkpoint Security Gateway R71.45
NA
CVE-2014-1673
Check Point Session Authentication Agent allows remote malicious users to obtain sensitive information (user credentials) via unspecified vectors.
Checkpoint Session Authentication Agent -
NA
CVE-2014-1672
Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing when the routing table is modified and the "Get - Interfaces with Topology" action is performed, which allows malicious users to bypass intended access restrictions.
Checkpoint Security Gateway R75.47
Checkpoint Management Server R75.47
NA
CVE-2013-7311
The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote malicious...
Checkpoint Gaia Os R75.0
Checkpoint Ipso Os 6.2
Checkpoint Gaia Os R76.0
NA
CVE-2013-7304
Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle malicious users to spoof SSL servers by presenting an arbitrary certificate during a session established by a client...
Checkpoint Endpoint Security Mi Server R73
NA
CVE-2013-5636
Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate malicious users to bypass the device-locking protection mechanism by overwriting DVREM...
Checkpoint Endpoint Security E80.40
Checkpoint Endpoint Security E80.41
Checkpoint Endpoint Security E80.50
Checkpoint Endpoint Security E80
Checkpoint Endpoint Security E80.10
Checkpoint Endpoint Security E80.30
Checkpoint Endpoint Security E80.20
NA
CVE-2013-5635
Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate malicious users to bypass the device-locking protection mechanism by entering password guesses w...
Checkpoint Endpoint Security E80.40
Checkpoint Endpoint Security E80.41
Checkpoint Endpoint Security E80.50
Checkpoint Endpoint Security E80
Checkpoint Endpoint Security E80.20
Checkpoint Endpoint Security E80.10
Checkpoint Endpoint Security E80.30
NA
CVE-2010-5184
Race condition in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memo...
Checkpoint Zonealarm Extreme Security 9.1.507.000
NA
CVE-2012-2753
Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privile...
Checkpoint Endpoint Security E80
Checkpoint Remote Access Clients E75.10
Checkpoint Endpoint Security E80.20
Checkpoint Endpoint Security E80.30
Checkpoint Endpoint Security Vpn R75
Checkpoint Endpoint Connect R73
Checkpoint Endpoint Security R73
Checkpoint Endpoint Security E80.10
Checkpoint Remote Access Clients E75
Checkpoint Remote Access Clients E75.20
NA
CVE-2012-3288
VMware Workstation 7.x prior to 7.1.6 and 8.x prior to 8.0.4, VMware Player 3.x prior to 3.1.6 and 4.x prior to 4.0.4, VMware Fusion 4.x prior to 4.1.3, VMware ESXi 3.5 up to and including 5.0, and VMware ESX 3.5 up to and including 4.1 allow user-assisted remote malicious users ...
Vmware Workstation 7.1.3
Vmware Workstation 7.1.4
Vmware Workstation 7.0
Vmware Workstation 7.1.5
Vmware Workstation 7.1.2
Vmware Workstation 7.1.4.16648
Vmware Workstation 7.0.1
Vmware Workstation 7.1
Vmware Workstation 7.1.1
Vmware Workstation 8.0.2
Vmware Workstation 8.0.3
Vmware Workstation 8.0
Vmware Workstation 8.0.1
Vmware Player 3.0.1
Vmware Player 3.1
Vmware Player 3.0
Vmware Player 3.1.5
Vmware Player 3.1.3
Vmware Player 3.1.4
Vmware Player 3.1.1
Vmware Player 3.1.2
Vmware Player 4.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »