Check Point Endpoint Security E80.30 VPN Blade platform

CPE Details

Check Point Endpoint Security E80.30 VPN Blade platform
e80.30
2012-06-20 13:39 +00:00
2012-06-21 18:43 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:checkpoint:endpoint_security:e80.30:-:vpn_blade:*:*:*:*:*

Informations

Vendor

checkpoint

Product

endpoint_security

Version

e80.30

Update

-

edition

vpn_blade

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2012-2753 2022-10-03 14:15 +00:00 Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory.
6.9
CVE-2022-23742 2022-05-12 17:23 +00:00 Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
7.8
HIGH
CVE-2019-8454 2019-04-29 13:10 +00:00 A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.
7
HIGH
CVE-2013-5635 2013-11-30 10:00 +00:00 Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously.
3.3
CVE-2013-5636 2013-11-30 10:00 +00:00 Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses.
3.3
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.