Show filters
122 Total Results
Displaying 21-30 of 122
Sort by:
Attacker Value
Unknown
CVE-2021-30357
Disclosure Date: June 08, 2021 (last updated November 28, 2024)
SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access.
0
Attacker Value
Unknown
CVE-2021-30356
Disclosure Date: April 22, 2021 (last updated November 28, 2024)
A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files.
0
Attacker Value
Unknown
CVE-2020-6024
Disclosure Date: January 20, 2021 (last updated November 28, 2024)
Check Point SmartConsole before R80.10 Build 185, R80.20 Build 119, R80.30 before Build 94, R80.40 before Build 415, and R81 before Build 548 were vulnerable to a possible local privilege escalation due to running executables from a directory with write access to all authenticated users.
0
Attacker Value
Unknown
CVE-2020-6021
Disclosure Date: December 03, 2020 (last updated November 28, 2024)
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client’s privileges.
0
Attacker Value
Unknown
CVE-2020-6015
Disclosure Date: November 05, 2020 (last updated November 28, 2024)
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations.
0
Attacker Value
Unknown
CVE-2020-6014
Disclosure Date: November 02, 2020 (last updated November 28, 2024)
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
0
Attacker Value
Unknown
CVE-2020-6023
Disclosure Date: October 27, 2020 (last updated November 28, 2024)
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware.
0
Attacker Value
Unknown
CVE-2020-6022
Disclosure Date: October 27, 2020 (last updated November 28, 2024)
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware.
0
Attacker Value
Unknown
CVE-2020-6020
Disclosure Date: September 24, 2020 (last updated November 28, 2024)
Check Point Security Management's Internal CA web management before Jumbo HFAs R80.10 Take 278, R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38, can be manipulated to run commands as a high privileged user or crash, due to weak input validation on inputs by a trusted management administrator.
0
Attacker Value
Unknown
CVE-2020-6012
Disclosure Date: August 04, 2020 (last updated November 28, 2024)
ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links. This allows an unprivileged user to enable escalation of privilege via local access.
0