Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2001-10-23T00:00:00", "descriptions": [{"lang": "en", "value": "Check Point VPN-1 4.1SP4 using SecuRemote returns different error messages for valid and invalid users, with prompts that vary depending on the authentication method being used, which makes it easier for remote attackers to conduct brute force attacks."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "3470", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/3470"}, {"name": "20011023 Check Point VPN-1 SecuRemote Flaw", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/222366"}, {"name": "vpn1-securemote-brute-force(7343)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7343"}, {"name": "20011024 RE: Check Point VPN-1 SecuRemote Flaw", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/222479"}, {"name": "20210", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://www.osvdb.org/20210"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1499", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Check Point VPN-1 4.1SP4 using SecuRemote returns different error messages for valid and invalid users, with prompts that vary depending on the authentication method being used, which makes it easier for remote attackers to conduct brute force attacks."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "3470", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3470"}, {"name": "20011023 Check Point VPN-1 SecuRemote Flaw", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/222366"}, {"name": "vpn1-securemote-brute-force(7343)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7343"}, {"name": "20011024 RE: Check Point VPN-1 SecuRemote Flaw", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/222479"}, {"name": "20210", "refsource": "OSVDB", "url": "http://www.osvdb.org/20210"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-08T04:58:11.370Z"}, "title": "CVE Program Container", "references": [{"name": "3470", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/3470"}, {"name": "20011023 Check Point VPN-1 SecuRemote Flaw", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/222366"}, {"name": "vpn1-securemote-brute-force(7343)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7343"}, {"name": "20011024 RE: Check Point VPN-1 SecuRemote Flaw", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/222479"}, {"name": "20210", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://www.osvdb.org/20210"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1499", "datePublished": "2005-06-21T04:00:00", "dateReserved": "2005-06-21T00:00:00", "dateUpdated": "2024-08-08T04:58:11.370Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}