Show filters
122 Total Results
Displaying 71-80 of 122
Sort by:
Attacker Value
Unknown
CVE-2007-0471
Disclosure Date: January 24, 2007 (last updated October 04, 2023)
sre/params.php in the Integrity Clientless Security (ICS) component in Check Point Connectra NGX R62 3.x and earlier before Security Hotfix 5, and possibly VPN-1 NGX R62, allows remote attackers to bypass security requirements via a crafted Report parameter, which returns a valid ICSCookie authentication token.
0
Attacker Value
Unknown
CVE-2006-3885
Disclosure Date: July 27, 2006 (last updated October 04, 2023)
Directory traversal vulnerability in Check Point Firewall-1 R55W before HFA03 allows remote attackers to read arbitrary files via an encoded .. (dot dot) in the URL on TCP port 18264.
0
Attacker Value
Unknown
CVE-2006-0255
Disclosure Date: January 18, 2006 (last updated February 22, 2025)
Unquoted Windows search path vulnerability in Check Point VPN-1 SecureClient might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run when SecureClient attempts to launch the Sr_GUI.exe program.
0
Attacker Value
Unknown
CVE-2005-2932
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
Multiple Check Point Zone Labs ZoneAlarm products before 7.0.362, including ZoneAlarm Security Suite 5.5.062.004 and 6.5.737, use insecure default permissions for critical files, which allows local users to gain privileges or bypass security controls.
0
Attacker Value
Unknown
CVE-2005-4093
Disclosure Date: December 08, 2005 (last updated February 22, 2025)
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
0
Attacker Value
Unknown
CVE-2005-3673
Disclosure Date: November 18, 2005 (last updated February 22, 2025)
The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows remote attackers to cause a denial of service via certain crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
0
Attacker Value
Unknown
CVE-2005-2889
Disclosure Date: September 14, 2005 (last updated February 22, 2025)
Check Point NGX R60 does not properly verify packets against the predefined service group "CIFS" rule, which allows remote attackers to bypass intended restrictions.
0
Attacker Value
Unknown
CVE-2005-0114
Disclosure Date: February 11, 2005 (last updated February 22, 2025)
vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer.
0
Attacker Value
Unknown
CVE-2004-2679
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Check Point Firewall-1 4.1 up to NG AI R55 allows remote attackers to obtain potentially sensitive information by sending an Internet Key Exchange (IKE) with a certain Vendor ID payload that causes Firewall-1 to return a response containing version and other information.
0
Attacker Value
Unknown
CVE-2004-0112
Disclosure Date: November 23, 2004 (last updated February 22, 2025)
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
0