Known Vulnerabilities for Check Point by Checkpoint
Listed below are 1 of the newest known vulnerabilities associated with "Check Point" by "Checkpoint".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-33693 | Lemmy is a link aggregator and forum for the fediverse. Prior to version 0.7.0-beta.9, the `v4_is_invalid()` function in `act... | Not Provided | 2026-03-27 | 2026-03-30 |
| CVE-2026-27750 | Avira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerability in the Optimizer component. A privileged ... | Not Provided | 2026-03-05 | 2026-04-01 |
| CVE-2026-22981 | In the Linux kernel, the following vulnerability has been resolved: idpf: detach and close netdevs while handling a reset P... | Not Provided | 2026-01-23 | 2026-04-02 |
| CVE-2005-3673 | The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows remote attackers to cause a denial ... | 7.8 - HIGH | 2005-11-18 | 2011-03-08 |