Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint zonealarm vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2007-2174
The IOCTL handling in srescan.sys in the ZoneAlarm Spyware Removal Engine (SRE) in Check Point ZoneAlarm prior to 5.0.156.0 allows local users to execute arbitrary code via certain IOCTL lrp parameter addresses.
Checkpoint Zonealarm
4.6
CVSSv2
CVE-2020-6023
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware.
Checkpoint Zonealarm
7.2
CVSSv2
CVE-2018-8790
Check Point ZoneAlarm version 15.3.064.17729 and below expose a WCF service that can allow a local low privileged user to execute arbitrary code as SYSTEM.
Checkpoint Zonealarm
4.3
CVSSv2
CVE-2008-7025
TrueVector in Check Point ZoneAlarm 8.0.020.000, with vsmon.exe running, allows remote HTTP proxies to cause a denial of service (crash) and disable the HIDS module via a crafted response.
Checkpoint Zonealarm 8.0.020.000
1 EDB exploit
4.4
CVSSv2
CVE-2020-6012
ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic link...
Checkpoint Zonealarm Anti-ransomware
6.5
CVSSv2
CVE-2020-6013
ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched syst...
Checkpoint Zonealarm Extreme Security
2.1
CVSSv2
CVE-2005-0114
vsdatant.sys in Zone Lab ZoneAlarm prior to 5.5.062.011, ZoneAlarm Wireless prior to 5.5.080.000, Check Point Integrity Client 4.x prior to 4.5.122.000 and 5.x prior to 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid me...
Zonelabs Zonealarm 5.5.062.011
Checkpoint Check Point Integrity Client
Zonelabs Zonealarm Wireless Security
Checkpoint Check Point Integrity Client 4.5.122.000
7.2
CVSSv2
CVE-2007-2730
Check Point ZoneAlarm Pro prior to 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privilege...
Comodo Comodo Firewall Pro 2.4.18.184
Comodo Comodo Personal Firewall 2.3.6.81
Checkpoint Zonealarm
NA
CVE-2023-28134
Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Checkpoint Endpoint Security E85
Checkpoint Endpoint Security E84
Checkpoint Endpoint Security E86
6.2
CVSSv2
CVE-2010-5184
Race condition in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memo...
Checkpoint Zonealarm Extreme Security 9.1.507.000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2