Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zonelabs zonealarm vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-1936
ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote malicious users to bypass e-mail protection via attachments whose names contain certain non-English characters.
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 3.0
Zonelabs Zonealarm 3.1
2.1
CVSSv2
CVE-2001-1548
ZoneAlarm 2.1 up to and including 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
Zonelabs Zonealarm 2.5
5
CVSSv2
CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and previous versions and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote malicious users to send potentially dangerous attachments.
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.5
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
5
CVSSv2
CVE-2004-1534
ZoneAlarm and ZoneAlarm Pro prior to 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript.
Zonelabs Zonealarm 5.5
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 5.0.590.015
7.5
CVSSv2
CVE-2005-3560
Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 up to and including 6.1, and (5) ZoneAlarm 6.0 allow remote malicious users to bypass the "Advanced Program Control and OS Firewall filter...
Zonelabs Zonealarm 6.0
Zonelabs Zonealarm Anti-spyware 6.1
Zonelabs Zonealarm Antivirus 6.0
Zonelabs Zonealarm Anti-spyware 6.0
Zonelabs Zonealarm Security Suite 6.0
1 EDB exploit
10
CVSSv2
CVE-2004-0309
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm prior to 4.5.538.001, ZoneLabs Integrity client 4.0 prior to 4.0.146.046, and 4.5 prior to 4.5.085, allows remote malicious users to execute arbitrary code via a long RCPT TO argument.
Zonelabs Zonealarm 4.5
Zonelabs Integrity 4.0
Zonelabs Zonealarm 4.0
4.9
CVSSv2
CVE-2007-2467
ZoneAlarm Pro 6.5.737.000, 6.1.744.001, and possibly earlier versions and other products, allows local users to cause a denial of service (system crash) by sending malformed data to the vsdatant device driver, which causes an invalid memory access.
Zonelabs Zonealarm 6.1.744.001
Zonelabs Zonealarm 6.5.737.000
5
CVSSv2
CVE-2002-1911
ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote malicious users to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue.
Zonelabs Zonealarm 3.1
Zonelabs Zonealarm 3.0
1 EDB exploit
10
CVSSv2
CVE-2003-1309
The DeviceIoControl function in the TrueVector Device Driver (VSDATANT) in ZoneAlarm prior to 3.7.211, Pro prior to 4.0.146.029, and Plus prior to 4.0.146.029 allows local users to gain privileges via certain signals (aka "Device Driver Attack").
Zonelabs Zonealarm 3.7.211
Zonelabs Zonealarm 3.7.202
4.9
CVSSv2
CVE-2006-3540
Check Point Zone Labs ZoneAlarm Internet Security Suite 6.5.722.000, 6.1.737.000, and possibly other versions do not properly validate RegSaveKey, RegRestoreKey, and RegDeleteKey function calls, which allows local users to cause a denial of service (system crash) via a certain co...
Zonelabs Zonealarm Security Suite 6.1.737.000
Zonelabs Zonealarm Security Suite 6.5.722.000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »