Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2001-0940
Buffer overflow in the GUI authentication code of Check Point VPN-1/FireWall-1 Management Server 4.0 and 4.1 allows remote malicious users to execute arbitrary code via a long user name.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
5
CVSSv2
CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and previous versions generates different error messages for invalid usernames versus invalid passwords, which allows remote malicious users to identify valid usernames on the firewall.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
2.1
CVSSv2
CVE-1999-0770
Firewall-1 sets a long timeout for connections that begin with ACK or other packets except SYN, allowing an malicious user to conduct a denial of service via a large number of connection attempts to unresponsive systems.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 3.0
1 EDB exploit
10
CVSSv2
CVE-2000-0894
HTTP server on the WatchGuard SOHO firewall does not properly restrict access to administrative functions such as password resets or rebooting, which allows malicious users to cause a denial of service or conduct unauthorized activities.
Watchguard Soho Firewall 1.6
Watchguard Soho Firewall 2.1.3
10
CVSSv2
CVE-2000-0895
Buffer overflow in HTTP server on the WatchGuard SOHO firewall allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long GET request.
Watchguard Soho Firewall 1.6
Watchguard Soho Firewall 2.1.3
5
CVSSv2
CVE-2002-0302
The Notify daemon for Symantec Enterprise Firewall (SEF) 6.5.x drops large alerts when SNMP is used as the transport, which could prevent some alerts from being sent in the event of an attack.
Symantec Enterprise Firewall 7.0
Symantec Enterprise Firewall 6.5.2
5
CVSSv2
CVE-2000-0482
Check Point Firewall-1 allows remote malicious users to cause a denial of service by sending a large number of malformed fragmented IP packets.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
1 EDB exploit
5
CVSSv2
CVE-2003-0757
Check Point FireWall-1 4.0 and 4.1 before SP5 allows remote malicious users to obtain the IP addresses of internal interfaces via certain SecuRemote requests to TCP ports 256 or 264, which leaks the IP addresses in a reply packet.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
1 EDB exploit
7.5
CVSSv2
CVE-2001-1158
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote malicious users to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 4.1 Build 41439
5
CVSSv2
CVE-2002-1203
IBM SecureWay Firewall prior to 4.2.2 performs extra processing before determining that a packet is invalid and dropping it, which allows remote malicious users to cause a denial of service (resource exhaustion) via a flood of malformed TCP packets without any flags set.
Ibm Secureway Firewall 4.2
Ibm Secureway Firewall 4.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »