Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
firewall vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-1037
Check Point Firewall-1 session agent 3.0 up to and including 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote malicious users to determine valid usernames and guess a password via a brute force attack.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
2 EDB exploits
NA
CVE-2002-0527
Watchguard SOHO firewall prior to 5.0.35 allows remote malicious users to cause a denial of service (crash and reboot) when SOHO forwards a packet with bad IP options.
Watchguard Soho Firewall 5.0.28
Watchguard Soho Firewall 5.0.31
Watchguard Soho Firewall 5.0.29
NA
CVE-2007-3086
Unrestricted critical resource lock in Agnitum Outpost Firewall PRO 4.0 1007.591.145 and previous versions allows local users to cause a denial of service (system hang) by capturing the outpost_ipc_hdr mutex.
Agnitum Outpost Firewall 4.0
Agnitum Outpost Firewall 4.0 1007.591.145
Agnitum Outpost Firewall 4.0 964.582.059
1 EDB exploit
NA
CVE-2001-1101
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b up to and including 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log'...
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
NA
CVE-2001-1102
Check Point FireWall-1 3.0b up to and including 4.1 for Solaris allows local users to overwrite arbitrary files via a symlink attack on temporary policy files that end in a .cpp extension, which are set world-writable.
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
NA
CVE-2000-0779
Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote malicious users to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests.
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
NA
CVE-2000-0804
Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass."
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
NA
CVE-2000-0806
The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and previous versions may allow remote malicious users to conduct a denial of service, aka "Inter-module Communications Bypass."
Checkpoint Firewall-1 4.1
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
NA
CVE-2000-0807
The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to spoof connections, aka the "OPSEC Authentication Vulnerability."
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
NA
CVE-2000-0809
Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and previous versions allows remote malicious users to cause a denial of service.
Checkpoint Firewall-1 3.0
Checkpoint Firewall-1 4.0
Checkpoint Firewall-1 4.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
hardcoded
arbitrary code
CVE-2024-2404
CVE-2024-21111
CVE-2024-28627
CVE-2024-4073
information disclosure
CVE-2024-32780
CVE-2024-4040
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »