Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Endpoint_security_clients
(Checkpoint)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-06-20 | CVE-2019-8458 | Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. | Capsule_docs, Endpoint_security_clients, Remote_access_clients | 4.4 | ||
2019-12-23 | CVE-2019-8463 | A denial of service vulnerability was reported in Check Point Endpoint Security Client for Windows before E82.10, that could allow service log file to be written to non-standard locations. | Endpoint_security_clients | N/A | ||
2019-06-20 | CVE-2019-8459 | Check Point Endpoint Security Client for Windows, with the VPN blade, before version E80.83, starts a process without using quotes in the path. This can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one. | Capsule_docs_standalone_client, Endpoint_security_clients, Endpoint_security_server_package, Jumbo_hotfix_for_endpoint_security_server, Remote_access_clients, Smartconsole_for_endpoint_security_server | 9.8 |