Page 2 of 22 results (0.004 seconds)

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 2

Untrusted search path vulnerability in the TrueVector service (VSMON.exe) in Zone Labs ZoneAlarm 6.x and Integrity does not search ZoneAlarm's own folders before other folders that are specified in a user's PATH, which might allow local users to execute code as SYSTEM by placing malicious DLLs into a folder that has insecure permissions, but is searched before ZoneAlarm's folder. NOTE: since this issue is dependent on the existence of a vulnerability in a separate product (weak permissions of executables or libraries, or the execution of malicious code), perhaps it should not be included in CVE. • http://reedarvin.thearvins.com/20060308-01.html http://securitytracker.com/id?1015743 http://www.securityfocus.com/archive/1/427122/100/0/threaded http://www.securityfocus.com/archive/1/427145/100/0/threaded http://www.securityfocus.com/archive/1/427309/100/0/threaded http://www.securityfocus.com/bid/17037 http://www.vupen.com/english/advisories/2006/0947 https://exchange.xforce.ibmcloud.com/vulnerabilities/25097 •

CVSS: 7.5EPSS: 5%CPEs: 6EXPL: 2

Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags. • https://www.exploit-db.com/exploits/26479 http://secunia.com/advisories/17450 http://securityreason.com/securityalert/155 http://www.osvdb.org/20677 http://www.securityfocus.com/archive/1/415968 http://www.securityfocus.com/bid/15347 https://exchange.xforce.ibmcloud.com/vulnerabilities/22971 •

CVSS: 10.0EPSS: 1%CPEs: 28EXPL: 0

Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 through 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB) r11.1, Vet Antivirus, Zonelabs ZoneAlarm Security Suite, and ZoneAlarm Antivirus, allows remote attackers to gain privileges via a compressed VBA directory with a project name length of -1, which leads to a heap-based buffer overflow. • http://crm.my-etrust.com/login.asp?username=guest&target=DOCUMENT&openparameter=1588 http://marc.info/?l=bugtraq&m=111686576416450&w=2 http://secunia.com/advisories/15470 http://secunia.com/advisories/15479 http://securitytracker.com/id?1014050 http://www.rem0te.com/public/images/vet.pdf http://www.securityfocus.com/bid/13710 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=32896 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer. • http://download.zonelabs.com/bin/free/securityAlert/19.html http://secunia.com/advisories/14256 http://www.idefense.com/application/poi/display?id=199&type=vulnerabilities http://www.securityfocus.com/bid/12531 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

ZoneAlarm and ZoneAlarm Pro before 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript. • http://download.zonelabs.com/bin/free/securityAlert/18.html http://marc.info/?l=bugtraq&m=110088808402495&w=2 http://secunia.com/advisories/13244 http://www.securityfocus.com/bid/11706 https://exchange.xforce.ibmcloud.com/vulnerabilities/18159 •