Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zonelabs zonealarm vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2004-1534
ZoneAlarm and ZoneAlarm Pro prior to 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript.
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 5.5
Zonelabs Zonealarm 5.0.590.015
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 4.5
5.1
CVSSv2
CVE-2004-0612
The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote malicious users to bypass the mobile code filtering. NOTE: it has been disputed by the vendor that this behavior is required by the SSL specif...
Zonelabs Zonealarm 5.0.590.015
10
CVSSv2
CVE-2004-0309
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm prior to 4.5.538.001, ZoneLabs Integrity client 4.0 prior to 4.0.146.046, and 4.5 prior to 4.5.085, allows remote malicious users to execute arbitrary code via a long RCPT TO argument.
Zonelabs Zonealarm 4.0
Zonelabs Integrity 4.0
Zonelabs Zonealarm 4.5
7.5
CVSSv2
CVE-2004-1936
ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote malicious users to bypass e-mail protection via attachments whose names contain certain non-English characters.
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 3.1
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 3.0
10
CVSSv2
CVE-2003-1309
The DeviceIoControl function in the TrueVector Device Driver (VSDATANT) in ZoneAlarm prior to 3.7.211, Pro prior to 4.0.146.029, and Plus prior to 4.0.146.029 allows local users to gain privileges via certain signals (aka "Device Driver Attack").
Zonelabs Zonealarm 3.7.211
Zonelabs Zonealarm 3.7.202
5
CVSSv2
CVE-2002-1911
ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote malicious users to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue.
Zonelabs Zonealarm 3.1
Zonelabs Zonealarm 3.0
1 EDB exploit
7.5
CVSSv2
CVE-2002-1997
ZoneAlarm Pro 3.0 MailSafe allows remote malicious users to bypass filtering and possibly execute arbitrary code via email attachments containing a trailing dot after the file extension.
Zonelabs Zonealarm 3.0
2.1
CVSSv2
CVE-2001-1548
ZoneAlarm 2.1 up to and including 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.3
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.5
2.1
CVSSv2
CVE-2001-0682
ZoneAlarm and ZoneAlarm Pro allows a local malicious user to cause a denial of service by running a trojan to initialize a ZoneAlarm mutex object which prevents ZoneAlarm from starting.
Zonelabs Zonealarm
Checkpoint Zonealarm Pro
5
CVSSv2
CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and previous versions and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote malicious users to send potentially dangerous attachments.
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.3
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »