Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zonelabs vulnerabilities and exploits
(subscribe to this query)
6.2
CVSSv2
CVE-2007-0351
Microsoft Windows XP and Windows Server 2003 do not properly handle user logoff, which might allow local users to gain the privileges of a previous system user, possibly related to user profile unload failure. NOTE: it is not clear whether this is an issue in Windows itself, or a...
Zonelabs Zonealarm
6.2
CVSSv2
CVE-2006-1221
Untrusted search path vulnerability in the TrueVector service (VSMON.exe) in Zone Labs ZoneAlarm 6.x and Integrity does not search ZoneAlarm's own folders before other folders that are specified in a user's PATH, which might allow local users to execute code as SYSTEM b...
Zonelabs Zonealarm Security Suite 6.1.744.000
5.1
CVSSv2
CVE-2004-0612
The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote malicious users to bypass the mobile code filtering. NOTE: it has been disputed by the vendor that this behavior is required by the SSL specif...
Zonelabs Zonealarm 5.0.590.015
5
CVSSv2
CVE-2004-1534
ZoneAlarm and ZoneAlarm Pro prior to 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript.
Zonelabs Zonealarm 5.5
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 5.0.590.015
5
CVSSv2
CVE-2002-1911
ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote malicious users to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue.
Zonelabs Zonealarm 3.1
Zonelabs Zonealarm 3.0
1 EDB exploit
5
CVSSv2
CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and previous versions and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote malicious users to send potentially dangerous attachments.
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.5
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
5
CVSSv2
CVE-2000-0220
ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event.
Zonelabs Zonealarm 2.0.26
4.9
CVSSv2
CVE-2007-2467
ZoneAlarm Pro 6.5.737.000, 6.1.744.001, and possibly earlier versions and other products, allows local users to cause a denial of service (system crash) by sending malformed data to the vsdatant device driver, which causes an invalid memory access.
Zonelabs Zonealarm 6.1.744.001
Zonelabs Zonealarm 6.5.737.000
4.9
CVSSv2
CVE-2006-3540
Check Point Zone Labs ZoneAlarm Internet Security Suite 6.5.722.000, 6.1.737.000, and possibly other versions do not properly validate RegSaveKey, RegRestoreKey, and RegDeleteKey function calls, which allows local users to cause a denial of service (system crash) via a certain co...
Zonelabs Zonealarm Security Suite 6.1.737.000
Zonelabs Zonealarm Security Suite 6.5.722.000
2.1
CVSSv2
CVE-2005-0114
vsdatant.sys in Zone Lab ZoneAlarm prior to 5.5.062.011, ZoneAlarm Wireless prior to 5.5.080.000, Check Point Integrity Client 4.x prior to 4.5.122.000 and 5.x prior to 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid me...
Zonelabs Zonealarm 5.5.062.011
Checkpoint Check Point Integrity Client
Zonelabs Zonealarm Wireless Security
Checkpoint Check Point Integrity Client 4.5.122.000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »