Filtered by vendor Checkpoint
Subscribe
Total
119 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-8790 | 1 Checkpoint | 1 Zonealarm | 2024-02-28 | 7.2 HIGH | 7.8 HIGH |
Check Point ZoneAlarm version 15.3.064.17729 and below expose a WCF service that can allow a local low privileged user to execute arbitrary code as SYSTEM. | |||||
CVE-2014-8952 | 1 Checkpoint | 1 Security Gateway | 2024-02-28 | 7.1 HIGH | N/A |
Multiple unspecified vulnerabilities in Check Point Security Gateway R75.40VS, R75.45, R75.46, R75.47, R76, R77, and R77.10, when the (1) IPS blade, (2) IPsec Remote Access, (3) Mobile Access / SSL VPN blade, (4) SSL Network Extender, (5) Identify Awareness blade, (6) HTTPS Inspection, (7) UserCheck, or (8) Data Leak Prevention blade module is enabled, allow remote attackers to cause a denial of service ("stability issue") via an unspecified "traffic condition." | |||||
CVE-2013-7304 | 1 Checkpoint | 1 Endpoint Security Mi Server R73 | 2024-02-28 | 4.3 MEDIUM | N/A |
Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle attackers to spoof SSL servers by presenting an arbitrary certificate during a session established by a client. | |||||
CVE-2013-7311 | 1 Checkpoint | 2 Gaia Os, Ipso Os | 2024-02-28 | 5.4 MEDIUM | N/A |
The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. | |||||
CVE-2014-8951 | 1 Checkpoint | 1 Security Gateway | 2024-02-28 | 7.1 HIGH | N/A |
Unspecified vulnerability in Check Point Security Gateway R75, R76, R77, and R77.10, when UserCheck is enabled and the (1) Application Control, (2) URL Filtering, (3) DLP, (4) Threat Emulation, (5) Anti-Bot, or (6) Anti-Virus blade is used, allows remote attackers to cause a denial of service (fwk0 process crash, core dump, and restart) via a redirect to the UserCheck page. | |||||
CVE-2014-8950 | 1 Checkpoint | 1 Security Gateway | 2024-02-28 | 7.1 HIGH | N/A |
Unspecified vulnerability in Check Point Security Gateway R77 and R77.10, when the (1) URL Filtering or (2) Identity Awareness blade is used, allows remote attackers to cause a denial of service (crash) via vectors involving an HTTPS request. | |||||
CVE-2014-1673 | 1 Checkpoint | 1 Session Authentication Agent | 2024-02-28 | 5.0 MEDIUM | N/A |
Check Point Session Authentication Agent allows remote attackers to obtain sensitive information (user credentials) via unspecified vectors. | |||||
CVE-2013-7350 | 1 Checkpoint | 1 Security Gateway | 2024-02-28 | 10.0 HIGH | N/A |
Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to "important security fixes." | |||||
CVE-2014-1672 | 1 Checkpoint | 2 Management Server, Security Gateway | 2024-02-28 | 4.0 MEDIUM | N/A |
Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing when the routing table is modified and the "Get - Interfaces with Topology" action is performed, which allows attackers to bypass intended access restrictions. | |||||
CVE-2012-2753 | 1 Checkpoint | 4 Endpoint Connect, Endpoint Security, Endpoint Security Vpn and 1 more | 2024-02-28 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory. | |||||
CVE-2013-5635 | 1 Checkpoint | 1 Endpoint Security | 2024-02-28 | 3.3 LOW | N/A |
Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously. | |||||
CVE-2013-5636 | 1 Checkpoint | 1 Endpoint Security | 2024-02-28 | 3.3 LOW | N/A |
Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses. | |||||
CVE-2011-2664 | 1 Checkpoint | 1 Multi-domain Management\/provider-1 | 2024-02-28 | 3.6 LOW | N/A |
Unspecified vulnerability in Check Point Multi-Domain Management / Provider-1 NGX R65, R70, R71, and R75, and SmartCenter during installation on non-Windows machines, allows local users on the MDS system to overwrite arbitrary files via unknown vectors. | |||||
CVE-2011-1827 | 1 Checkpoint | 3 Connectra Ngx, Vpn-1, Vpn-1 Firewall-1 Vsx | 2024-02-28 | 9.3 HIGH | N/A |
Multiple unspecified vulnerabilities in Check Point SSL Network Extender (SNX), SecureWorkSpace, and Endpoint Security On-Demand, as distributed by SecurePlatform, IPSO6, Connectra, and VSX, allow remote attackers to execute arbitrary code via vectors involving a (1) ActiveX control or (2) Java applet. | |||||
CVE-2008-7025 | 1 Checkpoint | 1 Zonealarm | 2024-02-28 | 4.3 MEDIUM | N/A |
TrueVector in Check Point ZoneAlarm 8.0.020.000, with vsmon.exe running, allows remote HTTP proxies to cause a denial of service (crash) and disable the HIDS module via a crafted response. | |||||
CVE-2008-7009 | 1 Checkpoint | 1 Zonealarm | 2024-02-28 | 6.9 MEDIUM | N/A |
Buffer overflow in multiscan.exe in Check Point ZoneAlarm Security Suite 7.0.483.000 and 8.0.020.000 allows local users to execute arbitrary code via a file or directory with a long path. NOTE: some of these details are obtained from third party information. | |||||
CVE-2008-5849 | 1 Checkpoint | 1 Vpn-1 | 2024-02-28 | 5.0 MEDIUM | N/A |
Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264. | |||||
CVE-2008-5994 | 1 Checkpoint | 1 Connectra Ngx | 2024-02-28 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in index.php in Check Point Connectra NGX R62 HFA_01 allows remote attackers to inject arbitrary web script or HTML via the dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2008-1397 | 1 Checkpoint | 5 Check Point Vpn-1 Pro, Vpn-1, Vpn-1 Firewall-1 and 2 more | 2024-02-28 | 6.5 MEDIUM | N/A |
Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint. | |||||
CVE-2008-0662 | 1 Checkpoint | 1 Vpn-1 Secureclient | 2024-02-28 | 7.2 HIGH | 7.8 HIGH |
The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials. |