Total vulnerabilities in the database
The default configuration of SecuRemote for Check Point Firewall-1 allows remote attackers to obtain sensitive configuration information for the protected network without authentication.
Software | From | Fixed in |
---|---|---|
checkpoint / firewall-1 | 4.1-sp1 | 4.1-sp1.x |
checkpoint / firewall-1 | 4.1-sp3 | 4.1-sp3.x |
checkpoint / firewall-1 | 4.1 | 4.1.x |
checkpoint / firewall-1 | 4.1-sp4 | 4.1-sp4.x |
checkpoint / firewall-1 | 4.0 | 4.0.x |
checkpoint / firewall-1 | 4.1-sp2 | 4.1-sp2.x |