Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zonealarm vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1936
ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote malicious users to bypass e-mail protection via attachments whose names contain certain non-English characters.
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 3.0
Zonelabs Zonealarm 3.1
NA
CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and previous versions and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote malicious users to send potentially dangerous attachments.
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.5
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
NA
CVE-2001-1548
ZoneAlarm 2.1 up to and including 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
Zonelabs Zonealarm 2.5
NA
CVE-2004-1534
ZoneAlarm and ZoneAlarm Pro prior to 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript.
Zonelabs Zonealarm 5.5
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 5.0.590.015
NA
CVE-2007-4216
vsdatant.sys 6.5.737.0 in Check Point Zone Labs ZoneAlarm prior to 7.0.362 allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in a METHOD_NEITHER (1) IOCTL 0x8400000F or (2) IOCTL 0x84000013 request, which can be used to overwrite arbitrary memory ...
Checkpoint Zonealarm 6.1.744.001
Checkpoint Zonealarm 5.0.63.0
Checkpoint Zonealarm
NA
CVE-2005-3560
Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 up to and including 6.1, and (5) ZoneAlarm 6.0 allow remote malicious users to bypass the "Advanced Program Control and OS Firewall filter...
Zonelabs Zonealarm 6.0
Zonelabs Zonealarm Anti-spyware 6.1
Zonelabs Zonealarm Antivirus 6.0
Zonelabs Zonealarm Anti-spyware 6.0
Zonelabs Zonealarm Security Suite 6.0
1 EDB exploit
NA
CVE-2005-2932
Multiple Check Point Zone Labs ZoneAlarm products prior to 7.0.362, including ZoneAlarm Security Suite 5.5.062.004 and 6.5.737, use insecure default permissions for critical files, which allows local users to gain privileges or bypass security controls.
Checkpoint Zonealarm Security Suite 5.5.062.004
Checkpoint Zonealarm Security Suite 6.5.737
Checkpoint Zonealarm
5.5
CVSSv3
CVE-2001-0682
ZoneAlarm and ZoneAlarm Pro allows a local malicious user to cause a denial of service by running a trojan to initialize a ZoneAlarm mutex object which prevents ZoneAlarm from starting.
Zonelabs Zonealarm
Checkpoint Zonealarm Pro
NA
CVE-2002-1911
ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote malicious users to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue.
Zonelabs Zonealarm 3.1
Zonelabs Zonealarm 3.0
1 EDB exploit
NA
CVE-2003-1309
The DeviceIoControl function in the TrueVector Device Driver (VSDATANT) in ZoneAlarm prior to 3.7.211, Pro prior to 4.0.146.029, and Plus prior to 4.0.146.029 allows local users to gain privileges via certain signals (aka "Device Driver Attack").
Zonelabs Zonealarm 3.7.211
Zonelabs Zonealarm 3.7.202
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »