The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Check Point Security Appliance

Check Point Security Gateway: lack of enforcemetn of authentication rules
An attacker can bypass restrictions of Check Point Security Gateway, in order to escalate his privileges...
sk166912, VIGILANCE-VUL-32297
Check Point Security Gateway: information disclosure via Predictable TCP Sequences
An attacker can bypass access restrictions to data via Predictable TCP Sequences of Check Point Security Gateway, in order to obtain sensitive information...
sk164775, VIGILANCE-VUL-31421
Check Point Gaia Embedded: privilege escalation via SMB Truncated Password
An attacker can bypass restrictions via SMB Truncated Password of Check Point Gaia Embedded, in order to escalate his privileges...
sk155172, VIGILANCE-VUL-30225
Check Point Gaia: privilege escalation via SMB 8 Characters Password
An attacker can bypass restrictions via SMB 8 Characters Password of Check Point Gaia, in order to escalate his privileges...
sk155172, VIGILANCE-VUL-29639
Check Point IPSec VPN: privilege escalation via IKEv2 Tunnel
An attacker can bypass restrictions via IKEv2 Tunnel of Check Point IPSec VPN, in order to escalate his privileges...
CVE-2019-8456, sk149892, VIGILANCE-VUL-28964
Check Point Security Gateway: invalid policy via Rulebase Domain Objects
The Check Point Security Gateway product can install a policy different from the one desired by the administrator with Rulebase Domain Objects...
sk133176, VIGILANCE-VUL-26899
Check Point Security Gateway: vulnerability
A vulnerability of Check Point Security Gateway was announced...
sk115596, VIGILANCE-VUL-21652
binutils/libiberty: seven vulnerabilities
Several vulnerabilities were announced in binutils/libiberty...
CVE-2016-4487, CVE-2016-4488, CVE-2016-4489, CVE-2016-4490, CVE-2016-4491, CVE-2016-4492, CVE-2016-4493, DLA-552-1, sk116495, USN-3337-1, USN-3367-1, USN-3368-1, VIGILANCE-VUL-20140
binutils: buffer overflow
An attacker can generate a buffer overflow of binutils, in order to trigger a denial of service, and possibly to run code...
CVE-2016-2226, DLA-552-1, sk116495, USN-3337-1, USN-3367-1, USN-3368-1, VIGILANCE-VUL-20139
Check Point Anti-Bot/Virus: malicious urls not blocked
An attacker can send documents containing malicious urls, which are not detected by Check Point Anti-Bot/Virus...
sk111740, VIGILANCE-VUL-19746
Our database contains other pages. You can request a free trial to read them.