Breaking News
- Learn More
- More News
Top Protections
- - Check Point Provides Preemptive Protection Against Critical Microsoft XML Core Services Vulnerability
- - Check Point Protects Against Two Critical Internet Explorer Remote Code Execution Vulnerabilities
- - Microsoft Data Access Components Vulnerability Could Allow Remote Code Execution
- More
- Overview
- Malware Resources
- Latest Protections
- Product Updates
- MS Security
Check Point Update Services Overview
In a constantly changing threat environment, defenses must evolve with or ahead of threats. Check Point Update Services provide real-time defense updates and configuration advice for IPS, URL Filtering, Antivirus & Anti-Malware, Anti-Spam & Email Security Security Service Software Blades. Also covered by Update Services are SmartDefense in NGX VPN-1, VSX, IPS-1, Connectra, Endpoint Security On Demand, and Endpoint Security products.
Key Benefits
- Pre-emptive Protection - Keep your defenses current between your regularly-scheduled product upgrades and security patches.
- Easy Management - Update your whole system in minutes. Each update comes with full configuration instructions and information about the associated threat.
- IPS, Web security, Antivirus, Anti-Malware, Web filtering, and Anti-Spam protection - Get the latest signatures and detection methods.
- Program Advisor - Update Check Point Endpoint Security with recommendations for application control for your endpoint computers.
- 24x7 Threat Coverage - Check Point Security products are supported by multiple Check Point Research and Response Centers around the globe that provided the best Microsoft vulnerability threat coverage amongst leading security vendors.
Malware Resources
Protect Better!
12 easy steps for boosting your organization's protection against malware
Malware Removal Resources
Malware-fighting utilities and recommendations on how to use them
Have an Infected Machine?
Find out how to identify and clean up malware and bot-infected computers
Get the Rescue CD – designed to scan, disinfect and restore infected machines that can't be disinfected with conventional malware removal tools |
Go to ThreatWiki Page
Latest Protections
Severity | Date | Check Point Reference |
Industry Reference |
Description |
---|---|---|---|---|
CPAI-2012-310 | CVE-2012-1861 | Microsoft SharePoint Script in Username Cross-site Scripting (MS12-050; CVE-2012-1861) | ||
CPAI-2012-309 | CVE-2012-1858 | Preemptive Protection against Microsoft SharePoint HTML Sanitization Cross-site Scripting (MS12-050; CVE-2012-1858) | ||
CPAI-2012-308 | CVE-2012-1889 | Preemptive Protection against Microsoft XML Uninitialized Memory Corruption (MS12-043; CVE-2012-1889) | ||
CPAI-2012-307 | CVE-2012-0175 | Microsoft Windows File and Directory Name Command Injection (MS12-048; CVE-2012-0175) | ||
CPAI-2012-306 | CVE-2012-1859 | Microsoft SharePoint XSS scriptresx.ashx Elevation of Privilege (MS12-050; CVE-2012-1859) | ||
CPAI-2012-305 | CVE-2012-1524 | Internet Explorer Attribute Remove Remote Code Execution (MS12-044; CVE-2012-1524) | ||
CPAI-2012-304 | CVE-2012-0163 | Microsoft .NET Framework Parameter Validation Code Execution (MS12-025; CVE-2012-0163) | ||
CPAI-2012-303 | CVE-2012-1891 | Microsoft Data Access Components ADO Cachesize Heap Overflow (MS12-045; CVE-2012-1891) | ||
CPAI-2012-302 | CVE-2012-1863 | Microsoft SharePoint Reflected List Parameter XSS (MS12-050; CVE-2012-1863) | ||
CPAI-2012-301 | CVE-2012-1522 | Internet Explorer Cached Object Remote Code Execution (MS12-044; CVE-2012-1522) | ||
CPAI-2012-263 | CVE-2012-1854 | Microsoft Visual Basic for Applications Insecure Library Loading (MS12-046; CVE-2012-1854) | ||
CPAI-2012-295 | CVE-2012-0708 | IBM Rational ClearQuest CQOle ActiveX Code Execution (CVE-2012-0708) | ||
CPAI-2012-293 | CVE-2012-0296 | Symantec Web Gateway timer.php Multiple Reflected Cross-site Scripting (CVE-2012-0296) | ||
CPAI-2012-292 | CVE-2012-1569 | GnuTLS libtasn1 ASN1 Length Fields Buffer Overflow (CVE-2012-1569) | ||
CPAI-2012-291 | CVE-2012-1569 | GnuTLS libtasn1 ASN1 Length DER Decoding Buffer Overflow (CVE-2012-1569) | ||
CPAI-2012-287 | CVE-2012-1675 | Oracle Database TNS Listener Service Registration Authentication Weakness (CVE-2012-1675) | ||
CPAI-2012-286 | Adobe Photoshop TIFF Parsing Heap Buffer Overflow | |||
CPAI-2012-285 | EMC Data Protection Advisor Denial of Service | |||
CPAI-2012-225 | CVE-2012-0392 | Apache Struts 2 CookieInterceptor OGNL Script Injection (CVE-2012-0392) | ||
CPAI-2012-276 | Cisco Linksys PlayerPT ActiveX Control Buffer Overflow | |||
CPAI-2012-275 | CVE-2012-2038 | Adobe Flash Player Malicious SWF File Security Bypass (APSB12-14; CVE-2012-2038) | ||
CPAI-2012-274 | CVE-2012-2034 | Adobe Flash Player ActionScript DOM Object Memory Corruption (APSB12-14; CVE-2012-2034) | ||
CPAI-2012-273 | CVE-2012-2035 | Adobe Flash Player Malicious JavaScript Code Execution (APSB12-14; CVE-2012-2035) | ||