Page 3 of 22 results (0.003 seconds)

CVSS: 1.9EPSS: 0%CPEs: 1EXPL: 0

Zone Alarm Pro 1.0 through 5.1 gives full access to %windir%\Internet Logs\* to the EVERYONE group, which allows local users to cause a denial of service by modifying the folder contents or permissions. NOTE: this issue has been disputed by the vendor, who claims that it does not affect product functionality since the same information is also saved in a protected file • http://archives.neohapsis.com/archives/bugtraq/2004-08/0389.html http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0871.html http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0883.html http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0933.html http://www.osvdb.org/9761 https://exchange.xforce.ibmcloud.com/vulnerabilities/17099 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 11%CPEs: 5EXPL: 0

Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument. • http://download.zonelabs.com/bin/free/securityAlert/8.html http://marc.info/?l=bugtraq&m=107722656827427&w=2 http://www.ciac.org/ciac/bulletins/o-084.shtml http://www.kb.cert.org/vuls/id/619982 http://www.osvdb.org/3991 http://www.securityfocus.com/bid/9696 https://exchange.xforce.ibmcloud.com/vulnerabilities/14991 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote attackers to bypass the mobile code filtering. NOTE: it has been disputed by the vendor that this behavior is required by the SSL specification. El filtro de Código Móvil en ZoneAlarm PRO 5.0.590.015 no filtra código móvil dentro de una sesión SSL cifrada, lo que podría permitir a un atacanter remoto saltarse el filtrado de código móvil. NOTA: El vendedor ha manifestado que esta conducta es requerida por la especificación SLL. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0420.html http://marc.info/?l=bugtraq&m=108786444608208&w=2 http://www.securityfocus.com/bid/10584 https://exchange.xforce.ibmcloud.com/vulnerabilities/16471 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote attackers to bypass e-mail protection via attachments whose names contain certain non-English characters. • http://marc.info/?l=bugtraq&m=108206751931251&w=2 http://marc.info/?l=bugtraq&m=108248415509417&w=2 http://www.securityfocus.com/bid/10148 https://exchange.xforce.ibmcloud.com/vulnerabilities/15884 •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 1

The DeviceIoControl function in the TrueVector Device Driver (VSDATANT) in ZoneAlarm before 3.7.211, Pro before 4.0.146.029, and Plus before 4.0.146.029 allows local users to gain privileges via certain signals (aka "Device Driver Attack"). • http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0070.html http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt http://sec-labs.hack.pl/papers/win32ddc.php http://secunia.com/advisories/9459 http://www.osvdb.org/2375 http://www.osvdb.org/4362 http://www.securityfocus.com/bid/8342 https://exchange.xforce.ibmcloud.com/vulnerabilities/12824 •