The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Endpoint Security by Check Point

Check Point Endpoint Security MI: certificate not checked
An attacker can access to the Check Point Endpoint Security MI service, without using a certificate...
BID-65135, CVE-2013-7304, sk97784, VIGILANCE-VUL-13968
Check Point Endpoint Security: brute force of Media Encryption EPM
A local attacker can bypass the limit of number of authentication failures of Media Encryption EPM of Check Point Endpoint Security, in order to use a brute force attack, to access to the encrypted device...
BID-64024, BID-64026, CVE-2013-5635, CVE-2013-5636, sk96589, VIGILANCE-VUL-13859
Check Point Endpoint Connect: command execution via DLL Preload
An attacker can create a malicious DLL and invite the victim to open Check Point Endpoint Connect in the same directory, in order to execute code...
BID-53925, CERTA-2012-AVI-318, CVE-2012-2753, sk76480, VIGILANCE-VUL-11688
PHP: denial of service via hash collision
An attacker can send data generating storage collisions, in order to overload a service...
BID-51193, c03183543, CERTA-2011-AVI-728, CVE-2011-4885, DSA-2399-1, DSA-2399-2, FEDORA-2012-0420, FEDORA-2012-0504, HPSBUX02741, MDVSA-2011:197, MDVSA-2012:071, n.runs-SA-2011.004, oCERT-2011-003, openSUSE-SU-2012:0426-1, RHSA-2012:0019-01, RHSA-2012:0033-01, RHSA-2012:0071-01, sk66350, SOL13588, SSRT100728, SUSE-SU-2012:0411-1, SUSE-SU-2012:0496-1, VIGILANCE-VUL-11379
Multiple: denial of service via hash collision
An attacker can send data generating storage collisions, in order to overload a service...
1506603, 2638420, 2659883, BID-51186, BID-51194, BID-51195, BID-51196, BID-51197, BID-51199, BID-51235, BID-51441, CERTA-2011-AVI-727, CERTA-2011-AVI-728, cpujul2018, CVE-2011-3414, CVE-2011-4461, CVE-2011-4462, CVE-2011-4885, CVE-2011-5034, CVE-2011-5035, CVE-2011-5036, CVE-2011-5037, CVE-2012-0039, CVE-2012-0193, CVE-2012-0839, DSA-2783-1, DSA-2783-2, FEDORA-2012-0730, FEDORA-2012-0752, MS11-100, n.runs-SA-2011.004, NTAP-20190307-0004, oCERT-2011-003, openSUSE-SU-2012:0262-1, PM53930, RHSA-2012:1604-01, RHSA-2012:1605-01, RHSA-2012:1606-01, RHSA-2013:1455-01, RHSA-2013:1456-01, sk66350, VIGILANCE-VUL-11254, VU#903934
Apache httpd: denial of service via Range or Request-Range
An attacker can use several parallel queries using Range or Request-Range, in order to progressively use the available memory...
BID-49303, c02997184, c03011498, c03025215, CERTA-2011-AVI-493, cisco-sa-20110830-apache, CVE-2011-3192, DSA-2298-1, DSA-2298-2, FEDORA-2011-12715, HPSBMU02704, HPSBUX02702, HPSBUX02707, KB73310, MDVSA-2011:130, MDVSA-2011:130-1, openSUSE-SU-2011, openSUSE-SU-2011:0993-1, PSN-2013-02-846, RHSA-2011:1245-01, RHSA-2011:1294-01, RHSA-2011:1300-01, RHSA-2011:1329-01, RHSA-2011:1330-01, RHSA-2011:1369-01, sk65222, SSA:2011-252-01, SSRT100606, SSRT100619, SSRT100626, SUSE-SU-2011:1000-1, SUSE-SU-2011:1007-1, SUSE-SU-2011:1010-1, SUSE-SU-2011:1215-1, SUSE-SU-2011:1216-1, VIGILANCE-VUL-10944, VU#405811
Check Point Endpoint Security On-Demand: code execution via Deployment Agent
A malicious web site can use the Deployment Agent, in order to execute code on victim's computer...
BID-47695, CVE-2011-1827, SEC Consult SA-20110810-0, sk62410, VIGILANCE-VUL-10618
Our database contains other pages. You can request a free trial to read them.