Page 3 of 23 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Zone Labs IMsecure and IMsecure Pro before 1.5 allow remote attackers to bypass Active Link Filtering via an instant message containing a URL with hex encoded file extensions. • http://download.zonelabs.com/bin/free/securityAlert/16.html http://marc.info/?l=bugtraq&m=110020607924001&w=2 http://secunia.com/advisories/13169 http://www.securityfocus.com/bid/11662 https://exchange.xforce.ibmcloud.com/vulnerabilities/18042 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

ZoneAlarm and ZoneAlarm Pro before 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript. • http://download.zonelabs.com/bin/free/securityAlert/18.html http://marc.info/?l=bugtraq&m=110088808402495&w=2 http://secunia.com/advisories/13244 http://www.securityfocus.com/bid/11706 https://exchange.xforce.ibmcloud.com/vulnerabilities/18159 •

CVSS: 10.0EPSS: 11%CPEs: 5EXPL: 0

Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument. • http://download.zonelabs.com/bin/free/securityAlert/8.html http://marc.info/?l=bugtraq&m=107722656827427&w=2 http://www.ciac.org/ciac/bulletins/o-084.shtml http://www.kb.cert.org/vuls/id/619982 http://www.osvdb.org/3991 http://www.securityfocus.com/bid/9696 https://exchange.xforce.ibmcloud.com/vulnerabilities/14991 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote attackers to bypass the mobile code filtering. NOTE: it has been disputed by the vendor that this behavior is required by the SSL specification. El filtro de Código Móvil en ZoneAlarm PRO 5.0.590.015 no filtra código móvil dentro de una sesión SSL cifrada, lo que podría permitir a un atacanter remoto saltarse el filtrado de código móvil. NOTA: El vendedor ha manifestado que esta conducta es requerida por la especificación SLL. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0420.html http://marc.info/?l=bugtraq&m=108786444608208&w=2 http://www.securityfocus.com/bid/10584 https://exchange.xforce.ibmcloud.com/vulnerabilities/16471 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote attackers to bypass e-mail protection via attachments whose names contain certain non-English characters. • http://marc.info/?l=bugtraq&m=108206751931251&w=2 http://marc.info/?l=bugtraq&m=108248415509417&w=2 http://www.securityfocus.com/bid/10148 https://exchange.xforce.ibmcloud.com/vulnerabilities/15884 •