Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint zonealarm vulnerabilities and exploits
(subscribe to this query)
320
VMScore
CVE-2020-6022
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware.
Checkpoint Zonealarm
187
VMScore
CVE-2019-8453
Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions. This can allow a local malicious user to replace a DLL file with a malicious one and cause Denial of Service to the client.
Checkpoint Zonealarm
320
VMScore
CVE-2019-8455
A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.
Checkpoint Zonealarm
435
VMScore
CVE-2008-7025
TrueVector in Check Point ZoneAlarm 8.0.020.000, with vsmon.exe running, allows remote HTTP proxies to cause a denial of service (crash) and disable the HIDS module via a crafted response.
Checkpoint Zonealarm 8.0.020.000
1 EDB exploit
187
VMScore
CVE-2005-0114
vsdatant.sys in Zone Lab ZoneAlarm prior to 5.5.062.011, ZoneAlarm Wireless prior to 5.5.080.000, Check Point Integrity Client 4.x prior to 4.5.122.000 and 5.x prior to 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid me...
Zonelabs Zonealarm 5.5.062.011
Checkpoint Check Point Integrity Client 4.5.122.000
Checkpoint Check Point Integrity Client
Zonelabs Zonealarm Wireless Security
392
VMScore
CVE-2020-6012
ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic link...
Checkpoint Zonealarm Anti-ransomware
578
VMScore
CVE-2020-6013
ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched syst...
Checkpoint Zonealarm Extreme Security
552
VMScore
CVE-2010-5184
Race condition in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memo...
Checkpoint Zonealarm Extreme Security 9.1.507.000
641
VMScore
CVE-2007-2730
Check Point ZoneAlarm Pro prior to 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privilege...
Checkpoint Zonealarm
Comodo Comodo Firewall Pro 2.4.18.184
Comodo Comodo Personal Firewall 2.3.6.81
NA
CVE-2023-28134
Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Checkpoint Endpoint Security E85
Checkpoint Endpoint Security E84
Checkpoint Endpoint Security E86
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2