Home
Bugtraq
Full List
Only Bugs
Only Tricks
Only Exploits
Only Dorks
Only CVE
Only CWE
Fake Notes
Ranking
CVEMAP
Full List
Show Vendors
Show Products
CWE Dictionary
Check CVE Id
Check CWE Id
Search
Bugtraq
CVEMAP
By author
CVE Id
CWE Id
By vendors
By products
RSS
Bugtraq
CVEMAP
CVE Products
Bugs
Exploits
Dorks
More
cIFrex
Facebook
Twitter
Donate
About
Submit
Vulnerabilities for
'Endpoint security'
2022-07-07
CVE-2022-23744
NVD-CWE-noinfo
Check Point Endpoint before version E86.50 failed to protect against specific registry change which allowed to disable endpoint protection by a local administrator.
2022-01-10
CVE-2021-30360
CWE-427
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
2020-12-03
CVE-2020-6021
CWE-427
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client�??s privileges.
2019-08-29
CVE-2019-8461
CWE-426
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user.
2019-04-29
CVE-2019-8454
CWE-264
A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.
2013-11-30
CVE-2013-5636
CWE-255
Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses.
CVE-2013-5635
CWE-255
Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously.
2012-06-19
CVE-2012-2753
CWE-Other
Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory.
>>>
Vendor:
Checkpoint
43
Products
Firewall-1
Zonealarm
Provider-1
Vpn-1
Check point vpn
Next generation
Vpn-1 firewall-1
Ng-ai
Check point integrity client
Connectra ngx
Zonealarm security suite
Check point
Express
Vpn-1 firewall-1 next generation
Secureclient ng
Vpn-1 secureclient
Endpoint security
Web intelligence
Security gateway
Vpn-1 utm edge
Management server
Vpn-1 utm edge w embedded ngx
Check point vpn-1 pro
Vpn-1 power utm
Vpn-1 power utm with ngx
Firewall-1 pki web service
Vpn-1 firewall-1 vsx
Multi-domain management/provider-1
Endpoint connect
Endpoint security vpn
Remote access clients
Zonealarm extreme security
Endpoint security mi server r73
Gaia os
Ipso os
Session authentication agent
Ipsec vpn
Smartconsole for endpoint security server
Endpoint security clients
Zonealarm anti-ransomware
Identity agent
Mobile access portal agent
Harmony endpoint
Copyright
2024
, cxsecurity.com
Back to Top