Check Point Endpoint Security E80.41 VPN Blade platform

CPE Details

Check Point Endpoint Security E80.41 VPN Blade platform
e80.41
2013-12-02
14h39 +00:00
2013-12-20
00h32 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:checkpoint:endpoint_security:e80.41:-:vpn_blade:*:*:*:*:*

Informations

Vendor

checkpoint

Product

endpoint_security

Version

e80.41

Update

-

edition

vpn_blade

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-23742 2022-05-12 17h23 +00:00 Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
7.8
Haute
CVE-2019-8454 2019-04-29 13h10 +00:00 A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.
7
Haute
CVE-2013-5635 2013-11-30 10h00 +00:00 Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously.
3.3
CVE-2013-5636 2013-11-30 10h00 +00:00 Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses.
3.3