Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Firewall\-1
(Checkpoint)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 43 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2000-11-14 | CVE-2000-0805 | Check Point VPN-1/FireWall-1 4.1 and earlier improperly retransmits encapsulated FWS packets, even if they do not come from a valid FWZ client, aka "Retransmission of Encapsulated Packets." | Firewall\-1 | N/A | ||
2000-11-14 | CVE-2000-0804 | Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass." | Firewall\-1 | N/A | ||
2000-10-20 | CVE-2000-0779 | Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote attackers to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests. | Firewall\-1 | N/A | ||
2000-06-06 | CVE-2000-0482 | Check Point Firewall-1 allows remote attackers to cause a denial of service by sending a large number of malformed fragmented IP packets. | Firewall\-1 | N/A | ||
2000-03-11 | CVE-2000-0181 | Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote attackers to determine the real IP address of the host that is making the connection. | Firewall\-1 | N/A | ||
2000-02-12 | CVE-2000-0150 | Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt. | Firewall\-1, Pix_firewall_software | N/A | ||
2000-01-29 | CVE-2000-0116 | Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag. | Firewall\-1 | N/A | ||
1998-05-11 | CVE-1999-1204 | Check Point Firewall-1 does not properly handle certain restricted keywords (e.g., Mail, auth, time) in user-defined objects, which could produce a rule with a default "ANY" address and result in access to more systems than intended by the administrator. | Firewall\-1 | N/A | ||
1999-07-29 | CVE-1999-0770 | Firewall-1 sets a long timeout for connections that begin with ACK or other packets except SYN, allowing an attacker to conduct a denial of service via a large number of connection attempts to unresponsive systems. | Firewall\-1 | N/A | ||
1999-08-09 | CVE-1999-0675 | Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host. | Firewall\-1 | N/A |