Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint zonealarm vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2022-23743
Check Point ZoneAlarm before version 15.8.200.19118 allows a local actor to escalate privileges during the upgrade process. In addition, weak permissions in the ProgramData\CheckPoint\ZoneAlarm\Data\Updates directory allow a local attacker the ability to execute an arbitrary file...
Checkpoint Zonealarm
NA
CVE-2022-41604
Check Point ZoneAlarm Extreme Security prior to 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junct...
Checkpoint Zonealarm
3.6
CVSSv2
CVE-2020-6022
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware.
Checkpoint Zonealarm
4.3
CVSSv2
CVE-2008-7025
TrueVector in Check Point ZoneAlarm 8.0.020.000, with vsmon.exe running, allows remote HTTP proxies to cause a denial of service (crash) and disable the HIDS module via a crafted response.
Checkpoint Zonealarm 8.0.020.000
1 EDB exploit
6.5
CVSSv2
CVE-2020-6013
ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched syst...
Checkpoint Zonealarm Extreme Security
4.4
CVSSv2
CVE-2020-6012
ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic link...
Checkpoint Zonealarm Anti-ransomware
2.1
CVSSv2
CVE-2005-0114
vsdatant.sys in Zone Lab ZoneAlarm prior to 5.5.062.011, ZoneAlarm Wireless prior to 5.5.080.000, Check Point Integrity Client 4.x prior to 4.5.122.000 and 5.x prior to 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid me...
Zonelabs Zonealarm 5.5.062.011
Checkpoint Check Point Integrity Client
Zonelabs Zonealarm Wireless Security
Checkpoint Check Point Integrity Client 4.5.122.000
7.2
CVSSv2
CVE-2007-2730
Check Point ZoneAlarm Pro prior to 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privilege...
Comodo Comodo Firewall Pro 2.4.18.184
Comodo Comodo Personal Firewall 2.3.6.81
Checkpoint Zonealarm
NA
CVE-2023-28134
Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Checkpoint Endpoint Security E85
Checkpoint Endpoint Security E84
Checkpoint Endpoint Security E86
6.2
CVSSv2
CVE-2010-5184
Race condition in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memo...
Checkpoint Zonealarm Extreme Security 9.1.507.000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2