Page 4 of 28 results (0.008 seconds)

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer. • http://download.zonelabs.com/bin/free/securityAlert/19.html http://secunia.com/advisories/14256 http://www.idefense.com/application/poi/display?id=199&type=vulnerabilities http://www.securityfocus.com/bid/12531 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

ZoneAlarm and ZoneAlarm Pro before 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript. • http://download.zonelabs.com/bin/free/securityAlert/18.html http://marc.info/?l=bugtraq&m=110088808402495&w=2 http://secunia.com/advisories/13244 http://www.securityfocus.com/bid/11706 https://exchange.xforce.ibmcloud.com/vulnerabilities/18159 •

CVSS: 1.9EPSS: 0%CPEs: 1EXPL: 0

Zone Alarm Pro 1.0 through 5.1 gives full access to %windir%\Internet Logs\* to the EVERYONE group, which allows local users to cause a denial of service by modifying the folder contents or permissions. NOTE: this issue has been disputed by the vendor, who claims that it does not affect product functionality since the same information is also saved in a protected file • http://archives.neohapsis.com/archives/bugtraq/2004-08/0389.html http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0871.html http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0883.html http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0933.html http://www.osvdb.org/9761 https://exchange.xforce.ibmcloud.com/vulnerabilities/17099 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 11%CPEs: 5EXPL: 0

Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument. • http://download.zonelabs.com/bin/free/securityAlert/8.html http://marc.info/?l=bugtraq&m=107722656827427&w=2 http://www.ciac.org/ciac/bulletins/o-084.shtml http://www.kb.cert.org/vuls/id/619982 http://www.osvdb.org/3991 http://www.securityfocus.com/bid/9696 https://exchange.xforce.ibmcloud.com/vulnerabilities/14991 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote attackers to bypass the mobile code filtering. NOTE: it has been disputed by the vendor that this behavior is required by the SSL specification. El filtro de Código Móvil en ZoneAlarm PRO 5.0.590.015 no filtra código móvil dentro de una sesión SSL cifrada, lo que podría permitir a un atacanter remoto saltarse el filtrado de código móvil. NOTA: El vendedor ha manifestado que esta conducta es requerida por la especificación SLL. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0420.html http://marc.info/?l=bugtraq&m=108786444608208&w=2 http://www.securityfocus.com/bid/10584 https://exchange.xforce.ibmcloud.com/vulnerabilities/16471 •