The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Check Point UTM-1 Appliance

Check Point: vulnerabilities of IPMI
An attacker can use IPMI vulnerabilities in several Check Point products, in order to perform management operations on the hardware...
sk94228, VIGILANCE-VUL-13270
Check Point R75.40VS: information disclosure via SecureXL
An attacker can capture SIP/MGCP packets when SecureXL is enabled on Check Point R75.40VS, in order to obtain sensitive information...
sk92814, VIGILANCE-VUL-13191
CheckPoint Security Gateway: information disclosure via VoIP
When SecureXL is enabled on caller side, an attacker can capture VoIP communications of CheckPoint Security Gateway, in order to obtain sensitive information...
sk92814, VIGILANCE-VUL-12981
Check Point VSX Virtual System: no policy
When Check Point VSX Virtual System R75.40VS/R76 (VSX mode) is restarted, the security policy may be not applied...
sk92812, VIGILANCE-VUL-12884
Check Point UTM-1: vulnerabilities of WebUI
An attacker can use several vulnerabilities of the WebUI interface of UTM-1 Edge and Safe@Office...
BID-50189, PR11-07, sk65460, VIGILANCE-VUL-11064
TCP: packets injection via a firewall and a malware
When an attacker installed an unprivileged malware on a client computer, and when a firewall is located between this client and a TCP server, an attacker who is located on the internet can guess valid sequence numbers, in order to inject data in this TCP session...
FGA-2012-19, sk74640, VIGILANCE-VUL-11656
OpenSSH: information disclosure via CBC
An attacker capturing an OpenSSH session has a low probability to obtain 32 bits of plain text...
247186, 6761890, BID-32319, CPNI-957037, CVE-2008-5161, DSA-2019-197, NetBSD-SA2009-005, RHSA-2009:1287-02, sk36343, sol14609, VIGILANCE-VUL-8251, VU#958563
Our database contains other pages. You can request a free trial to read them.