Page 6 of 31 results (0.005 seconds)

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 2

ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue. • https://www.exploit-db.com/exploits/21943 http://archives.neohapsis.com/archives/bugtraq/2002-10/0238.html http://www.iss.net/security_center/static/10379.php http://www.securityfocus.com/archive/1/295434 http://www.securityfocus.com/bid/5975 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

ZoneAlarm Pro 3.0 MailSafe allows remote attackers to bypass filtering and possibly execute arbitrary code via email attachments containing a trailing dot after the file extension. • http://www.securityfocus.com/archive/1/265387 http://www.securityfocus.com/bid/4407 https://exchange.xforce.ibmcloud.com/vulnerabilities/8744 •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 2

ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters. • http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.html http://archives.neohapsis.com/archives/bugtraq/2001-12/0065.html http://www.iss.net/security_center/static/7671.php http://www.securityfocus.com/bid/3647 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

MailSafe in Zone Labs ZoneAlarm 2.6 and earlier and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote attackers to send potentially dangerous attachments. • http://www.securityfocus.com/archive/1/197681 http://www.securityfocus.com/bid/3055 http://www.zonelabs.com/products/zap/rel_history.html#2.6.362 https://exchange.xforce.ibmcloud.com/vulnerabilities/6877 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules. • https://www.exploit-db.com/exploits/19871 http://www.osvdb.org/1294 http://www.securityfocus.com/bid/1137 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000421044123.2353.qmail%40securityfocus.com •