Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zonealarm vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-5044
ZoneAlarm Pro 7.0.362.000 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) NtCreatePort and (2) NtDeleteFile kernel SSD...
Zonelabs Zonealarm 7.0.362.000
7.4
CVSSv3
CVE-2020-6012
ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic link...
Checkpoint Zonealarm Anti-ransomware
8.8
CVSSv3
CVE-2020-6013
ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched syst...
Checkpoint Zonealarm Extreme Security
NA
CVE-2005-0114
vsdatant.sys in Zone Lab ZoneAlarm prior to 5.5.062.011, ZoneAlarm Wireless prior to 5.5.080.000, Check Point Integrity Client 4.x prior to 4.5.122.000 and 5.x prior to 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid me...
Zonelabs Zonealarm 5.5.062.011
Checkpoint Check Point Integrity Client
Zonelabs Zonealarm Wireless Security
Checkpoint Check Point Integrity Client 4.5.122.000
7.8
CVSSv3
CVE-2019-8452
A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with li...
Checkpoint Endpoint Security
Checkpoint Zonealarm
1 EDB exploit
NA
CVE-2006-1221
Untrusted search path vulnerability in the TrueVector service (VSMON.exe) in Zone Labs ZoneAlarm 6.x and Integrity does not search ZoneAlarm's own folders before other folders that are specified in a user's PATH, which might allow local users to execute code as SYSTEM b...
Zonelabs Zonealarm Security Suite 6.1.744.000
NA
CVE-2007-2730
Check Point ZoneAlarm Pro prior to 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privilege...
Comodo Comodo Firewall Pro 2.4.18.184
Comodo Comodo Personal Firewall 2.3.6.81
Checkpoint Zonealarm
NA
CVE-2005-1693
Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 up to and including 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB)...
Broadcom Etrust Antivirus 7.1
Ca Etrust Antivirus 7.1
Broadcom Etrust Ez Armor 2.4.4
Broadcom Etrust Ez Armor Le 2.0
Ca Etrust Secure Content Manager 1.0
Broadcom Etrust Secure Content Manager 1.1
Broadcom Etrust Antivirus 6.0
Broadcom Etrust Antivirus 7.0
Broadcom Etrust Ez Armor 1.0
Broadcom Etrust Ez Armor 2.0
Broadcom Etrust Intrusion Detection 1.4.5
Broadcom Etrust Intrusion Detection 1.5
Broadcom Etrust Intrusion Detection 3.0
Zonelabs Zonealarm
Zonelabs Zonealarm Antivirus
Ca Brightstor Arcserve Backup 11.1
Broadcom Etrust Antivirus Ee 6.0
Broadcom Etrust Antivirus Ee 7.0
Broadcom Etrust Ez Armor Le 3.0.0.14
Broadcom Etrust Intrusion Detection 1.4.1.13
Broadcom Inoculateit 6.0
Ca Vet Antivirus 10.66
NA
CVE-2001-1549
Tiny Personal Firewall 1.0 and 2.0 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Tiny Software Tiny Personal Firewall 1.0
Tiny Software Tiny Personal Firewall 2.0
1 EDB exploit
7.8
CVSSv3
CVE-2023-28134
Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Checkpoint Endpoint Security E85
Checkpoint Endpoint Security E84
Checkpoint Endpoint Security E86
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »