Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0806
The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and previous versions may allow remote malicious users to conduct a denial of service, aka "Inter-module Communications Bypass."
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
7.5
CVSSv2
CVE-2000-0807
The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to spoof connections, aka the "OPSEC Authentication Vulnerability."
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
7.5
CVSSv2
CVE-2000-0808
The seed generation mechanism in the inter-module S/Key authentication mechanism in Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to bypass authentication via a brute force attack, aka "One-time (s/key) Password Authentication."
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
5
CVSSv2
CVE-2000-0809
Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to cause a denial of service.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
7.5
CVSSv2
CVE-2000-1037
Check Point Firewall-1 session agent 3.0 up to and including 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote malicious users to determine valid usernames and guess a password via a brute force attack.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
2 EDB exploits
6.4
CVSSv2
CVE-2001-1101
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b up to and including 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log'...
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
5
CVSSv2
CVE-2000-0181
Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote malicious users to determine the real IP address of the host that is making the connection.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
7.2
CVSSv2
CVE-2005-2932
Multiple Check Point Zone Labs ZoneAlarm products prior to 7.0.362, including ZoneAlarm Security Suite 5.5.062.004 and 6.5.737, use insecure default permissions for critical files, which allows local users to gain privileges or bypass security controls.
Checkpoint Zonealarm Security Suite 5.5.062.004
Checkpoint Zonealarm Security Suite 6.5.737
Checkpoint Zonealarm
5.4
CVSSv2
CVE-2013-7311
The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote malicious...
Checkpoint Gaia Os R75.0
Checkpoint Ipso Os 6.2
Checkpoint Gaia Os R76.0
4.6
CVSSv2
CVE-2019-8452
A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with li...
Checkpoint Endpoint Security
Checkpoint Zonealarm
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »