Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zonelabs vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1936
ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote malicious users to bypass e-mail protection via attachments whose names contain certain non-English characters.
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 3.0
Zonelabs Zonealarm 3.1
NA
CVE-2001-1548
ZoneAlarm 2.1 up to and including 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
Zonelabs Zonealarm 2.5
NA
CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and previous versions and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote malicious users to send potentially dangerous attachments.
Zonelabs Zonealarm 2.1
Zonelabs Zonealarm 2.6
Zonelabs Zonealarm 2.5
Zonelabs Zonealarm 2.4
Zonelabs Zonealarm 2.2
Zonelabs Zonealarm 2.3
NA
CVE-2004-1534
ZoneAlarm and ZoneAlarm Pro prior to 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript.
Zonelabs Zonealarm 5.5
Zonelabs Zonealarm 4.0
Zonelabs Zonealarm 4.5.538.001
Zonelabs Zonealarm 4.5
Zonelabs Zonealarm 5.0.590.015
NA
CVE-2004-1517
Zone Labs IMsecure and IMsecure Pro prior to 1.5 allow remote malicious users to bypass Active Link Filtering via an instant message containing a URL with hex encoded file extensions.
Zonelabs Imsecure 1.0.0.0
Zonelabs Imsecure 1.0.1.0
Zonelabs Imsecure 1.0.2.0
NA
CVE-2004-0309
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm prior to 4.5.538.001, ZoneLabs Integrity client 4.0 prior to 4.0.146.046, and 4.5 prior to 4.5.085, allows remote malicious users to execute arbitrary code via a long RCPT TO argument.
Zonelabs Zonealarm 4.5
Zonelabs Integrity 4.0
Zonelabs Zonealarm 4.0
NA
CVE-2005-3560
Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 up to and including 6.1, and (5) ZoneAlarm 6.0 allow remote malicious users to bypass the "Advanced Program Control and OS Firewall filter...
Zonelabs Zonealarm 6.0
Zonelabs Zonealarm Anti-spyware 6.1
Zonelabs Zonealarm Antivirus 6.0
Zonelabs Zonealarm Anti-spyware 6.0
Zonelabs Zonealarm Security Suite 6.0
1 EDB exploit
NA
CVE-2002-1911
ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote malicious users to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue.
Zonelabs Zonealarm 3.1
Zonelabs Zonealarm 3.0
1 EDB exploit
NA
CVE-2003-1309
The DeviceIoControl function in the TrueVector Device Driver (VSDATANT) in ZoneAlarm prior to 3.7.211, Pro prior to 4.0.146.029, and Plus prior to 4.0.146.029 allows local users to gain privileges via certain signals (aka "Device Driver Attack").
Zonelabs Zonealarm 3.7.211
Zonelabs Zonealarm 3.7.202
NA
CVE-2007-2467
ZoneAlarm Pro 6.5.737.000, 6.1.744.001, and possibly earlier versions and other products, allows local users to cause a denial of service (system crash) by sending malformed data to the vsdatant device driver, which causes an invalid memory access.
Zonelabs Zonealarm 6.1.744.001
Zonelabs Zonealarm 6.5.737.000
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »