Show filters
41 Total Results
Displaying 31-40 of 41
Sort by:
Attacker Value
Unknown

CVE-2004-0612

Disclosure Date: December 06, 2004 (last updated February 22, 2025)
The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote attackers to bypass the mobile code filtering. NOTE: it has been disputed by the vendor that this behavior is required by the SSL specification.
0
Attacker Value
Unknown

CVE-2004-0309

Disclosure Date: November 23, 2004 (last updated February 22, 2025)
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument.
0
Attacker Value
Unknown

CVE-2004-1936

Disclosure Date: April 14, 2004 (last updated February 22, 2025)
ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote attackers to bypass e-mail protection via attachments whose names contain certain non-English characters.
0
Attacker Value
Unknown

CVE-2003-1309

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
The DeviceIoControl function in the TrueVector Device Driver (VSDATANT) in ZoneAlarm before 3.7.211, Pro before 4.0.146.029, and Plus before 4.0.146.029 allows local users to gain privileges via certain signals (aka "Device Driver Attack").
0
Attacker Value
Unknown

CVE-2002-1911

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue.
0
Attacker Value
Unknown

CVE-2002-1997

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
ZoneAlarm Pro 3.0 MailSafe allows remote attackers to bypass filtering and possibly execute arbitrary code via email attachments containing a trailing dot after the file extension.
0
Attacker Value
Unknown

CVE-2001-1548

Disclosure Date: December 31, 2001 (last updated February 22, 2025)
ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
0
Attacker Value
Unknown

CVE-2001-0682

Disclosure Date: August 29, 2001 (last updated February 22, 2025)
ZoneAlarm and ZoneAlarm Pro allows a local attacker to cause a denial of service by running a trojan to initialize a ZoneAlarm mutex object which prevents ZoneAlarm from starting.
Attacker Value
Unknown

CVE-2001-1373

Disclosure Date: July 18, 2001 (last updated February 22, 2025)
MailSafe in Zone Labs ZoneAlarm 2.6 and earlier and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote attackers to send potentially dangerous attachments.
0
Attacker Value
Unknown

CVE-2000-0339

Disclosure Date: April 24, 2000 (last updated February 22, 2025)
ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules.
0