Total vulnerabilities in the database
Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Software | From | Fixed in |
---|---|---|
checkpoint / endpoint_security | e85 | e85.x |
checkpoint / endpoint_security | e84 | e84.x |
checkpoint / endpoint_security | e86 | e86.x |