Page 5 of 24 results (0.003 seconds)

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 2

ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters. • http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.html http://archives.neohapsis.com/archives/bugtraq/2001-12/0065.html http://www.iss.net/security_center/static/7671.php http://www.securityfocus.com/bid/3647 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

MailSafe in Zone Labs ZoneAlarm 2.6 and earlier and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote attackers to send potentially dangerous attachments. • http://www.securityfocus.com/archive/1/197681 http://www.securityfocus.com/bid/3055 http://www.zonelabs.com/products/zap/rel_history.html#2.6.362 https://exchange.xforce.ibmcloud.com/vulnerabilities/6877 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules. • https://www.exploit-db.com/exploits/19871 http://www.osvdb.org/1294 http://www.securityfocus.com/bid/1137 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000421044123.2353.qmail%40securityfocus.com •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0220 •