Vulnerable Systems:
* Check Point Software UTM-1 Edge 8.2.43 and prior
An attacker may leverage these issues to access sensitive information, redirect an unsuspecting victim to an attacker-controlled site, or steal cookie-based authentication credentials, to perform unauthorized actions in the context of a user's session.