The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Check Point Endpoint Security

Check Point Endpoint Security Client for Windows: denial of service via Non-standard Locations Log Files Storing
An attacker can trigger a fatal error via Non-standard Locations Log Files Storing of Check Point Endpoint Security Client for Windows, in order to trigger a denial of service...
CVE-2019-8463, sk163578, VIGILANCE-VUL-31245
Check Point Endpoint Security Initial Client for Windows: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Check Point Endpoint Security Initial Client for Windows, in order to execute code...
CVE-2019-8461, sk160812, sk161792, VIGILANCE-VUL-30209
Check Point Endpoint Security Client for Windows: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Check Point Endpoint Security Client for Windows, in order to execute code...
CVE-2019-8458, sk153053, VIGILANCE-VUL-29598
Check Point Endpoint Security Client for Windows: code execution via Unquoted Command
An attacker can use a vulnerability via Unquoted Command of Check Point Endpoint Security Client for Windows, in order to run code...
CVE-2019-8459, VIGILANCE-VUL-29597
Check Point Endpoint Security: file corruption
A local attacker can create a hard link, in order to alter the pointed file, with privileges of Check Point Endpoint Security...
CVE-2019-8452, CVE-2019-8454, VIGILANCE-VUL-29162
Check Point IPSec VPN: privilege escalation via IKEv2 Tunnel
An attacker can bypass restrictions via IKEv2 Tunnel of Check Point IPSec VPN, in order to escalate his privileges...
CVE-2019-8456, sk149892, VIGILANCE-VUL-28964
Check Point Endpoint Security MI: certificate not checked
An attacker can access to the Check Point Endpoint Security MI service, without using a certificate...
BID-65135, CVE-2013-7304, sk97784, VIGILANCE-VUL-13968
Check Point Endpoint Security: brute force of Media Encryption EPM
A local attacker can bypass the limit of number of authentication failures of Media Encryption EPM of Check Point Endpoint Security, in order to use a brute force attack, to access to the encrypted device...
BID-64024, BID-64026, CVE-2013-5635, CVE-2013-5636, sk96589, VIGILANCE-VUL-13859
Check Point Endpoint Connect: command execution via DLL Preload
An attacker can create a malicious DLL and invite the victim to open Check Point Endpoint Connect in the same directory, in order to execute code...
BID-53925, CERTA-2012-AVI-318, CVE-2012-2753, sk76480, VIGILANCE-VUL-11688
PHP: denial of service via hash collision
An attacker can send data generating storage collisions, in order to overload a service...
BID-51193, c03183543, CERTA-2011-AVI-728, CVE-2011-4885, DSA-2399-1, DSA-2399-2, FEDORA-2012-0420, FEDORA-2012-0504, HPSBUX02741, MDVSA-2011:197, MDVSA-2012:071, n.runs-SA-2011.004, oCERT-2011-003, openSUSE-SU-2012:0426-1, RHSA-2012:0019-01, RHSA-2012:0033-01, RHSA-2012:0071-01, sk66350, SOL13588, SSRT100728, SUSE-SU-2012:0411-1, SUSE-SU-2012:0496-1, VIGILANCE-VUL-11379
Our database contains other pages. You can request a free trial to read them.