Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zonelabs zonealarm vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1534
ZoneAlarm and ZoneAlarm Pro prior to 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript.
Zonelabs Zonealarm 5.5
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 5.0.590.015
NA
CVE-2004-2713
Zone Alarm Pro 1.0 up to and including 5.1 gives full access to %windir%\Internet Logs\* to the EVERYONE group, which allows local users to cause a denial of service by modifying the folder contents or permissions. NOTE: this issue has been disputed by the vendor, who claims that...
Zonelabs Zonealarm 1.0
NA
CVE-2004-0612
The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote malicious users to bypass the mobile code filtering. NOTE: it has been disputed by the vendor that this behavior is required by the SSL specif...
Zonelabs Zonealarm 5.0.590.015
NA
CVE-2004-0309
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm prior to 4.5.538.001, ZoneLabs Integrity client 4.0 prior to 4.0.146.046, and 4.5 prior to 4.5.085, allows remote malicious users to execute arbitrary code via a long RCPT TO argument.
Zonelabs Zonealarm 4.5
Zonelabs Integrity 4.0
Zonelabs Zonealarm 4.0
NA
CVE-2004-1936
ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote malicious users to bypass e-mail protection via attachments whose names contain certain non-English characters.
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 3.0
Zonelabs Zonealarm 3.1
NA
CVE-2003-1309
The DeviceIoControl function in the TrueVector Device Driver (VSDATANT) in ZoneAlarm prior to 3.7.211, Pro prior to 4.0.146.029, and Plus prior to 4.0.146.029 allows local users to gain privileges via certain signals (aka "Device Driver Attack").
Zonelabs Zonealarm 3.7.211
Zonelabs Zonealarm 3.7.202
NA
CVE-2002-1911
ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote malicious users to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue.
Zonelabs Zonealarm 3.1
Zonelabs Zonealarm 3.0
1 EDB exploit
NA
CVE-2002-1997
ZoneAlarm Pro 3.0 MailSafe allows remote malicious users to bypass filtering and possibly execute arbitrary code via email attachments containing a trailing dot after the file extension.
Zonelabs Zonealarm 3.0
NA
CVE-2001-1548
ZoneAlarm 2.1 up to and including 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
Zonelabs Zonealarm 2.5
NA
CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and previous versions and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote malicious users to send potentially dangerous attachments.
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.5
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »