No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-22 CVE vendor Products Updated cvss v3.1 authenticated Gaia users is inject can inject code or command by global variable through special HTTP r
CVE | vendor | Products | Updated | cvss v3.1 |
---|
authenticated Gaia users is inject can inject code or command by global variable through special HTTP request . A Security fix is is that mitigate this vulnerability is available . |
Local privilege escalation in Check Point Endpoint Security Client (version E87.30) via crafted OpenSSL configuration file |
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j). |
multiple unspecified vulnerability in Check Point Security Gateway 80 R71.x is have before R71.45 ( 730159141 ) and r75.20.x before r75.20.4 and 600 and 1100 appliance r75.20.x before R75.20.42 have unknown impact and attack vector relate to ” important security fix . “ |
Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory. |
The ospf implementation is consider in Check point Gaia os R75.X and R76 and IPSO os 6.2 R75.X and R76 does not consider the possibility of duplicate Link state ID value in Link State Advertisement ( LSA ) packet before perform operation on the LSA database , which allow remote attacker to cause a denial of service ( routing disruption ) or obtain sensitive packet information via a craft LSA packet , a related issue to CVE-2013 – 0149 . |
check Point SecuRemote NG with Application Intelligence R54 allow attacker to obtain credential and gain privilege via unknown attack vector . |
check Point firewall-1 4.1 and Next Generation ( NG ) , with UserAuth configure to proxy HTTP traffic only , allow remote attacker to pass unauthorized https , ftp and possibly other traffic through the firewall . |
Check Point FireWall-1 4.0 and 4.1 before SP5 allows remote attackers to obtain the IP addresses of internal interfaces via certain SecuRemote requests to TCP ports 256 or 264, which leaks the IP addresses in a reply packet. |
Multiple unspecified vulnerabilities in Check Point SSL Network Extender (SNX), SecureWorkSpace, and Endpoint Security On-Demand, as distributed by SecurePlatform, IPSO6, Connectra, and VSX, allow remote attackers to execute arbitrary code via vectors involving a (1) ActiveX control or (2) Java applet. |
race condition is allows in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allow local user to bypass kernel – mode hook handler , and execute dangerous code that would otherwise be block by a handler but not block by signature – base malware detection , via certain user – space memory change during hook – handler execution , aka an argument – switch attack or a khobe attack . note : this issue is dispute by some third party because it is a flaw in a protection mechanism for situation where a craft program has already begin to execute |
Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. |
Local user may lead to privilege escalation using Gaia Portal hostnames page. |
Check Point FireWall-1 allows remote attackers to cause a denial of service (high CPU) via a flood of packets to port 264. |
Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. |
The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall. |
The seed generation mechanism in the inter-module S/Key authentication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass authentication via a brute force attack, aka “One-time (s/key) Password Authentication.” |
The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka “Inter-module Communications Bypass.” |
Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to cause a denial of service. |
check Point VPN-1 / firewall-1 4.1 and early improperly retransmit encapsulate FWS packet , even if they do not come from a valid FWZ client , aka ” retransmission of encapsulate Packets . “ |