OVALdb logo

Профессиональный OVAL репозиторий

Критерии поиска:  Пространство имён: com.altx-soft.gaia ,  Класс: уязвимость ,  Семейство: gaia

Страница 1 из 1 (Всего элементов: 29)Предыдущая1Следующая
oval:com.altx-soft.gaia:def:21OpenSSL TLS Man-In-The-Middle Security Bypass in Check Point (CVE-2014-0224)уязвимость
oval:com.altx-soft.gaia:def:31GNU C Library gethostbyname Buffer Overflow in Check Point (CVE-2015-0235)уязвимость
oval:com.altx-soft.gaia:def:42Vulnerability in the virtual floppy drive code in Check Point (CVE-2015-3456)уязвимость
oval:com.altx-soft.gaia:def:51Mail Transfer Agent (MTA) protection bypass in Check Pointуязвимость
oval:com.altx-soft.gaia:def:61Check Point Firewalls are vulnerable to simple SYN floodingуязвимость
oval:com.altx-soft.gaia:def:345Important security and stability enhancements for Security Gateway (CVE-2014-8952)уязвимость
oval:com.altx-soft.gaia:def:351Check Point response to TLS 1.x padding vulnerability (sk103683)уязвимость
oval:com.altx-soft.gaia:def:361Detection issue of malicious URLs in Anti-Bot / Anti-Virus after installing Take 143 of R77.30 Jumbo Hotfix Accumulator (sk111740)уязвимость
oval:com.altx-soft.gaia:def:371R77.30, R77.20 Security hotfix for DLP and Threat Extraction blades (sk115596)уязвимость
oval:com.altx-soft.gaia:def:381Check Point response to OpenSSH CBC Mode Information Disclosure Vulnerability (CVE-2008-5161)уязвимость
oval:com.altx-soft.gaia:def:391Mitigating the BEAST attack in R75.40VS, R75.46 and R76 (sk74100)уязвимость
oval:com.altx-soft.gaia:def:401Anti-Virus / Anti-Bot / Application Control / URL Filtering update might fail on R75.40 / R75.40VS / R75.45 / R75.46 / E80.41 (sk90700)уязвимость
oval:com.altx-soft.gaia:def:411Check Point response to XSS and CSRF vulnerabilities in Mobile Access Blade portal (sk91000)уязвимость
oval:com.altx-soft.gaia:def:421Anti-Virus / Anti-Bot policy enforcement issue on VSX gateways (sk92464)уязвимость
oval:com.altx-soft.gaia:def:431Policy installation failure (sk92812)уязвимость
oval:com.altx-soft.gaia:def:441SecureXL on R75.40VS Security Gateway can not process SIP/MGCP packets that should be encrypted (sk92814)уязвимость
oval:com.altx-soft.gaia:def:451SSH encapsulated in DNS traffic is not detected by Application Control (sk92938)уязвимость
oval:com.altx-soft.gaia:def:461Check Point response to OSPF LSA spoofing vulnerability (CVE-2013-0149)уязвимость
oval:com.altx-soft.gaia:def:471Check Point response to OSPF LSA spoofing vulnerability (CVE-2013-7311)уязвимость
oval:com.altx-soft.gaia:def:481Security Gateway Virtual Edition (VE) VMWare OVF template security update (sk96026)уязвимость
oval:com.altx-soft.gaia:def:491Security enhancements for 600 / 1100 / Security Gateway 80 Appliances (sk98332)уязвимость
oval:com.altx-soft.gaia:def:501Check Point offers important security update for prevents attack vector on the web server (sk98666)уязвимость
oval:com.altx-soft.gaia:def:511Random traffic outages when UserCheck is enabled on Security Gateway (CVE-2014-8951)уязвимость
oval:com.altx-soft.gaia:def:521When URL Filtering or Identity Awareness is enabled, trying to reach HTTPS sites can cause the Gateway to crash (CVE-2014-8950)уязвимость
oval:com.altx-soft.gaia:def:572Check Point response to TCP SACK PANIC - Linux Kernel vulnerabilities (CVE-2019-11478)уязвимость
oval:com.altx-soft.gaia:def:582Check Point response to TCP SACK PANIC - Linux Kernel vulnerabilities (CVE-2019-11477)уязвимость
oval:com.altx-soft.gaia:def:591Gaia Portal cannot load showing ERR_SSL_VERSION_OR_CIPHER_MISMATCH error in the browser (CVE-2013-2566)уязвимость
oval:com.altx-soft.gaia:def:602Anti-Spoofing might be enforced incorrectly in specific scenarios on R75.47 Security Gateway (CVE-2014-1672)уязвимость
oval:com.altx-soft.gaia:def:612Vulnerability in Check Point R80.30 Security Gateway before JHF Take 50 (CVE-2019-8462)уязвимость
Страница 1 из 1 (Всего элементов: 29)Предыдущая1Следующая

компания АЛТЭКС-СОФТ 2008-2021, © АО АЛТЭКС-СОФТ , ovaldb@altx-soft.com

OVAL and the OVAL logo are registered trademarks of The MITRE Corporation. Other names may be trademarks of their respective owners.