Show filters
53 Total Results
Displaying 31-40 of 53
Sort by:
Attacker Value
Unknown

CVE-2002-1623

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
The design of the Internet Key Exchange (IKE) protocol, when using Aggressive Mode for shared secret authentication, does not encrypt initiator or responder identities during negotiation, which may allow remote attackers to determine valid usernames by (1) monitoring responses before the password is supplied or (2) sniffing, as originally reported for FireWall-1 SecuRemote.
0
Attacker Value
Unknown

CVE-2002-0428

Disclosure Date: August 12, 2002 (last updated February 22, 2025)
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
0
Attacker Value
Unknown

CVE-2001-0940

Disclosure Date: September 21, 2001 (last updated February 22, 2025)
Buffer overflow in the GUI authentication code of Check Point VPN-1/FireWall-1 Management Server 4.0 and 4.1 allows remote attackers to execute arbitrary code via a long user name.
0
Attacker Value
Unknown

CVE-2001-1101

Disclosure Date: September 08, 2001 (last updated February 22, 2025)
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack.
0
Attacker Value
Unknown

CVE-2001-1102

Disclosure Date: September 08, 2001 (last updated February 22, 2025)
Check Point FireWall-1 3.0b through 4.1 for Solaris allows local users to overwrite arbitrary files via a symlink attack on temporary policy files that end in a .cpp extension, which are set world-writable.
0
Attacker Value
Unknown

CVE-2001-1303

Disclosure Date: July 18, 2001 (last updated February 22, 2025)
The default configuration of SecuRemote for Check Point Firewall-1 allows remote attackers to obtain sensitive configuration information for the protected network without authentication.
0
Attacker Value
Unknown

CVE-2000-1032

Disclosure Date: December 11, 2000 (last updated February 22, 2025)
The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall.
0
Attacker Value
Unknown

CVE-2000-1037

Disclosure Date: December 11, 2000 (last updated February 22, 2025)
Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack.
0
Attacker Value
Unknown

CVE-2000-0807

Disclosure Date: November 14, 2000 (last updated February 22, 2025)
The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to spoof connections, aka the "OPSEC Authentication Vulnerability."
0
Attacker Value
Unknown

CVE-2000-0813

Disclosure Date: November 14, 2000 (last updated February 22, 2025)
Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to redirect FTP connections to other servers ("FTP Bounce") via invalid FTP commands that are processed improperly by FireWall-1, aka "FTP Connection Enforcement Bypass."
0