mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
127 lines
4.7 KiB
JSON
127 lines
4.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2007-0471",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "sre/params.php in the Integrity Clientless Security (ICS) component in Check Point Connectra NGX R62 3.x and earlier before Security Hotfix 5, and possibly VPN-1 NGX R62, allows remote attackers to bypass security requirements via a crafted Report parameter, which returns a valid ICSCookie authentication token."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "1017559",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1017559"
|
|
},
|
|
{
|
|
"name": "20070122 Check Point Connectra End Point security bypass",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051920.html"
|
|
},
|
|
{
|
|
"name": "20070122 Check Point Connectra End Point security bypass",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/457683/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.checkpoint.com/downloads/latest/hfa/connectra/security_r62.html"
|
|
},
|
|
{
|
|
"name": "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.checkpoint.com/downloads/latest/hfa/vpn1_security/vpn1_R62_Windows.html"
|
|
},
|
|
{
|
|
"name": "2179",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/2179"
|
|
},
|
|
{
|
|
"name": "23847",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/23847"
|
|
},
|
|
{
|
|
"name": "20070122 Re: [Full-disclosure] Check Point Connectra End Point security bypass",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/457621/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "checkpoint-params-security-bypass(31646)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31646"
|
|
},
|
|
{
|
|
"name": "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472",
|
|
"refsource": "MISC",
|
|
"url": "http://secureknowledge.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?lid=sk32472"
|
|
},
|
|
{
|
|
"name": "31655",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/31655"
|
|
},
|
|
{
|
|
"name": "1017560",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1017560"
|
|
},
|
|
{
|
|
"name": "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf",
|
|
"refsource": "MISC",
|
|
"url": "http://updates.checkpoint.com/fileserver/ID/7126/FILE/VPN-1_Hotfix1.pdf"
|
|
},
|
|
{
|
|
"name": "ADV-2007-0276",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2007/0276"
|
|
}
|
|
]
|
|
}
|
|
} |