Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2001-1303
The default configuration of SecuRemote for Check Point Firewall-1 allows remote malicious users to obtain sensitive configuration information for the protected network without authentication.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
1 EDB exploit
7.5
CVSSv2
CVE-2003-0546
up2date 3.0.7 and 3.1.23 does not properly verify RPM GPG signatures, which could allow remote malicious users to cause unsigned packages to be installed from the Red Hat Network, if that network is compromised.
Redhat Up2date 3.0.7-1
Redhat Up2date 3.1.23-1
5
CVSSv2
CVE-2000-0582
Check Point FireWall-1 4.0 and 4.1 allows remote malicious users to cause a denial of service by sending a stream of invalid commands (such as binary zeros) to the SMTP Security Server proxy.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
1 EDB exploit
5
CVSSv2
CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and previous versions generates different error messages for invalid usernames versus invalid passwords, which allows remote malicious users to identify valid usernames on the firewall.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
7.5
CVSSv2
CVE-2001-0940
Buffer overflow in the GUI authentication code of Check Point VPN-1/FireWall-1 Management Server 4.0 and 4.1 allows remote malicious users to execute arbitrary code via a long user name.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.0
5
CVSSv2
CVE-2008-5849
Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote malicious users to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response contain...
Checkpoint Vpn-1 R55
Checkpoint Vpn-1 R65
NA
CVE-2022-38604
Wacom Driver 6.3.46-1 for Windows and lower exists to contain an arbitrary file deletion vulnerability.
Wacom Driver 6.3.45-1
Wacom Driver 6.3.46-1
1 Github repository
2.1
CVSSv2
CVE-2013-5724
Phpbb3 prior to 3.0.11-4 for Debian GNU/Linux uses world-writable permissions for cache files, which allows local users to modify the file contents via standard filesystem write operations.
Debian Phpbb3 3.0.7-p1-5
Debian Phpbb3 3.0.11-1
Debian Phpbb3 3.0.7-p1-1
Debian Phpbb3 3.0.2-4
Debian Phpbb3 3.0.7-p1-2
Debian Phpbb3 3.0.0-rc5-1
Debian Phpbb3 3.0.7-p1-3
Debian Phpbb3 3.0.0-rc7-1
Debian Phpbb3 3.0.0-rc4-1
Debian Phpbb3 3.0.0-2
Debian Phpbb3 3.0.0-rc2-1
Debian Phpbb3 3.0.11-2
Debian Phpbb3 3.0.2-2
Debian Phpbb3 3.0.7-p1-4
Debian Phpbb3 3.0.10-2
Debian Phpbb3 3.0.0-rc3-1
Debian Phpbb3 3.0.0-rc1
Debian Phpbb3 3.0.2-3
Debian Phpbb3 3.0.4-1
Debian Phpbb3 3.0.10-1
Debian Phpbb3 3.0.0-1
Debian Phpbb3 3.0.0-b5
6.9
CVSSv2
CVE-2008-5313
mailscanner 4.68.8 and other versions prior to 4.74.16-1 might allow local users to overwrite arbitrary files via a symlink attack on certain temporary files used by the (1) f-prot-autoupdate, (2) clamav-autoupdate, (3) avast-autoupdate, and (4) f-prot-6-autoupdate scripts in /et...
Mailscanner Mailscanner 4.73.4-2
Mailscanner Mailscanner 4.70.7-1
Mailscanner Mailscanner 4.68.8-1
Mailscanner Mailscanner 4.72.5-1
Mailscanner Mailscanner 4.68.8
Mailscanner Mailscanner 4.69.9-3
Mailscanner Mailscanner 4.71.10-1
5.8
CVSSv2
CVE-2012-2681
Cumin prior to 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote malicious users to guess the session key.
Trevor Mckay Cumin 0.1.5192-1
Trevor Mckay Cumin 0.1.4916-1
Trevor Mckay Cumin 0.1.4410-2
Trevor Mckay Cumin 0.1.4794-1
Trevor Mckay Cumin 0.1.5098-2
Trevor Mckay Cumin 0.1.4369-1
Trevor Mckay Cumin 0.1.3160-1
Trevor Mckay Cumin 0.1.4494-1
Trevor Mckay Cumin
Redhat Enterprise Mrg 2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »