cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-41604,https://securityvulnerability.io/vulnerability/CVE-2022-41604,,"Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.",Checkpoint,Zonealarm,8.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-09-27T02:17:14.000Z,0 CVE-2022-23743,https://securityvulnerability.io/vulnerability/CVE-2022-23743,,"Check Point ZoneAlarm before version 15.8.200.19118 allows a local actor to escalate privileges during the upgrade process. In addition, weak permissions in the ProgramData\CheckPoint\ZoneAlarm\Data\Updates directory allow a local attacker the ability to execute an arbitrary file write, leading to execution of code as local system, in ZoneAlarm versions before v15.8.211.192119",Checkpoint,Zonealarm.,7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-05-11T00:00:00.000Z,0 CVE-2020-6023,https://securityvulnerability.io/vulnerability/CVE-2020-6023,,Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware.,Checkpoint,Check Point Zonealarm,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-10-27T13:52:57.000Z,0 CVE-2020-6022,https://securityvulnerability.io/vulnerability/CVE-2020-6022,,Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware.,Checkpoint,Check Point Zonealarm,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2020-10-27T13:50:50.000Z,0 CVE-2020-6012,https://securityvulnerability.io/vulnerability/CVE-2020-6012,,"ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links. This allows an unprivileged user to enable escalation of privilege via local access.",Checkpoint,Zonealarm Anti-ransomware,7.4,HIGH,0.0014799999771639705,false,false,false,false,,false,false,2020-08-04T13:35:42.000Z,0 CVE-2020-6013,https://securityvulnerability.io/vulnerability/CVE-2020-6013,,ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems.,Checkpoint,Check Point Zonealarm,8.8,HIGH,0.0011899999808520079,false,false,false,false,,false,false,2020-07-06T17:54:48.000Z,0 CVE-2019-8453,https://securityvulnerability.io/vulnerability/CVE-2019-8453,,Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions. This can allow a local attacker to replace a DLL file with a malicious one and cause Denial of Service to the client.,Checkpoint,Check Point Zonealarm,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2019-04-17T14:06:40.000Z,0 CVE-2019-8455,https://securityvulnerability.io/vulnerability/CVE-2019-8455,,A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.,Checkpoint,Check Point Zonealarm,7.1,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2019-04-17T14:05:54.000Z,0 CVE-2010-5184,https://securityvulnerability.io/vulnerability/CVE-2010-5184,,"Race condition in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute",Checkpoint,Zonealarm Extreme Security,,,0.0004199999966658652,false,false,false,false,,false,false,2012-08-25T21:55:00.000Z,0 CVE-2008-7025,https://securityvulnerability.io/vulnerability/CVE-2008-7025,,"TrueVector in Check Point ZoneAlarm 8.0.020.000, with vsmon.exe running, allows remote HTTP proxies to cause a denial of service (crash) and disable the HIDS module via a crafted response.",Checkpoint,Zonealarm,,,0.0017999999690800905,false,false,false,false,,false,false,2009-08-21T14:00:00.000Z,0 CVE-2008-7009,https://securityvulnerability.io/vulnerability/CVE-2008-7009,,Buffer overflow in multiscan.exe in Check Point ZoneAlarm Security Suite 7.0.483.000 and 8.0.020.000 allows local users to execute arbitrary code via a file or directory with a long path. NOTE: some of these details are obtained from third party information.,Checkpoint,Zonealarm,,,0.0011699999449774623,false,false,false,false,,false,false,2009-08-19T10:00:00.000Z,0 CVE-2007-4216,https://securityvulnerability.io/vulnerability/CVE-2007-4216,,"vsdatant.sys 6.5.737.0 in Check Point Zone Labs ZoneAlarm before 7.0.362 allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in a METHOD_NEITHER (1) IOCTL 0x8400000F or (2) IOCTL 0x84000013 request, which can be used to overwrite arbitrary memory locations.",Checkpoint,Zonealarm,,,0.0006000000284984708,false,false,false,false,,false,false,2007-08-21T17:00:00.000Z,0 CVE-2007-2730,https://securityvulnerability.io/vulnerability/CVE-2007-2730,,"Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier.",Checkpoint,"Zonealarm,Comodo Firewall Pro,Comodo Personal Firewall",,,0.0004199999966658652,false,false,false,false,,false,false,2007-05-16T22:00:00.000Z,0 CVE-2007-2174,https://securityvulnerability.io/vulnerability/CVE-2007-2174,,The IOCTL handling in srescan.sys in the ZoneAlarm Spyware Removal Engine (SRE) in Check Point ZoneAlarm before 5.0.156.0 allows local users to execute arbitrary code via certain IOCTL lrp parameter addresses.,Checkpoint,Zonealarm,,,0.0004199999966658652,false,false,false,false,,false,false,2007-04-24T16:00:00.000Z,0 CVE-2005-2932,https://securityvulnerability.io/vulnerability/CVE-2005-2932,,"Multiple Check Point Zone Labs ZoneAlarm products before 7.0.362, including ZoneAlarm Security Suite 5.5.062.004 and 6.5.737, use insecure default permissions for critical files, which allows local users to gain privileges or bypass security controls.",Checkpoint,"Zonealarm Security Suite,Zonealarm",,,0.0004199999966658652,false,false,false,false,,false,false,2005-12-31T05:00:00.000Z,0