6.9
CVE-2012-2753
- EPSS 0.07%
- Veröffentlicht 19.06.2012 20:55:07
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Checkpoint ≫ Endpoint Connect Versionr73
Checkpoint ≫ Endpoint Security Versione80 Update- Editionvpn_blade
Checkpoint ≫ Endpoint Security Versione80.10 Update- Editionvpn_blade
Checkpoint ≫ Endpoint Security Versione80.20 Update- Editionvpn_blade
Checkpoint ≫ Endpoint Security Versione80.30 Update- Editionvpn_blade
Checkpoint ≫ Endpoint Security Versionr73
Checkpoint ≫ Endpoint Security Vpn Versionr75
Checkpoint ≫ Remote Access Clients Versione75
Checkpoint ≫ Remote Access Clients Versione75.10
Checkpoint ≫ Remote Access Clients Versione75.20
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.184 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.9 | 3.4 | 10 |
AV:L/AC:M/Au:N/C:C/I:C/A:C
|