<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2023-28133 version E87.40 in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/CVE-2023-28133-version-E87-40/m-p/188217#M7362</link>
    <description>&lt;P&gt;According to the sk181276:&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;This problem was fixed. The fix is included &lt;STRONG&gt;starting from:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL style="font-weight: bold;"&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk181206" target="_blank" rel="noopener"&gt;Enterprise Endpoint Security E87.31 (E87.30 Hotfix) Windows Clients&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;So E87.40 should include it. E87.31 is not a fix to E87.30 but a new client version, and E87.40 is a successor.&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 01 Aug 2023 07:57:35 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2023-08-01T07:57:35Z</dc:date>
    <item>
      <title>CVE-2023-28133 version E87.40</title>
      <link>https://community.checkpoint.com/t5/Endpoint/CVE-2023-28133-version-E87-40/m-p/188212#M7361</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Does the new version of the endpoint client (E87.40) also include fixes for CVE-2023-28133 mentioned in sk181276?&lt;/P&gt;&lt;P&gt;E87.31 (E87.30 Hotfix) for CVE-2023-28133 was released on July 19, new version E87.40 was released on July 31.&lt;/P&gt;&lt;P class=""&gt;Do you know if the hotfix has been included in the new version E87.40?&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Best,&lt;/P&gt;&lt;P class=""&gt;Mark&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2023 07:31:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/CVE-2023-28133-version-E87-40/m-p/188212#M7361</guid>
      <dc:creator>Sucream</dc:creator>
      <dc:date>2023-08-01T07:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-28133 version E87.40</title>
      <link>https://community.checkpoint.com/t5/Endpoint/CVE-2023-28133-version-E87-40/m-p/188217#M7362</link>
      <description>&lt;P&gt;According to the sk181276:&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;This problem was fixed. The fix is included &lt;STRONG&gt;starting from:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL style="font-weight: bold;"&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk181206" target="_blank" rel="noopener"&gt;Enterprise Endpoint Security E87.31 (E87.30 Hotfix) Windows Clients&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;So E87.40 should include it. E87.31 is not a fix to E87.30 but a new client version, and E87.40 is a successor.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 01 Aug 2023 07:57:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/CVE-2023-28133-version-E87-40/m-p/188217#M7362</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-08-01T07:57:35Z</dc:date>
    </item>
  </channel>
</rss>

