3 results (0.003 seconds)

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

Check Point Zone Labs ZoneAlarm Internet Security Suite 6.5.722.000, 6.1.737.000, and possibly other versions do not properly validate RegSaveKey, RegRestoreKey, and RegDeleteKey function calls, which allows local users to cause a denial of service (system crash) via a certain combination of these function calls with an HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VETFDDNT\Enum argument. Check Point Zone Labs ZoneAlarm Internet Security Suite 6.5.722.000, 6.1.737.000, y posiblemente otras versiones no validan apropiadamente llamadas a funciones RegSaveKey, RegRestoreKey, y RegDeleteKey, lo cual permite a usuarios locales provocar una denegación de servicio (caída de sistema) mediante determinadas combinaciones de estas llamadas a funciones con el argumento: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VETFDDNT\Enum . • http://www.matousec.com/info/advisories/ZoneAlarm-Insufficient-protection-of-registry-key-VETFDDNT-Enum.php http://www.securityfocus.com/archive/1/438970/100/0/threaded http://www.securityfocus.com/bid/18789 https://exchange.xforce.ibmcloud.com/vulnerabilities/27584 •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 2

Untrusted search path vulnerability in the TrueVector service (VSMON.exe) in Zone Labs ZoneAlarm 6.x and Integrity does not search ZoneAlarm's own folders before other folders that are specified in a user's PATH, which might allow local users to execute code as SYSTEM by placing malicious DLLs into a folder that has insecure permissions, but is searched before ZoneAlarm's folder. NOTE: since this issue is dependent on the existence of a vulnerability in a separate product (weak permissions of executables or libraries, or the execution of malicious code), perhaps it should not be included in CVE. • http://reedarvin.thearvins.com/20060308-01.html http://securitytracker.com/id?1015743 http://www.securityfocus.com/archive/1/427122/100/0/threaded http://www.securityfocus.com/archive/1/427145/100/0/threaded http://www.securityfocus.com/archive/1/427309/100/0/threaded http://www.securityfocus.com/bid/17037 http://www.vupen.com/english/advisories/2006/0947 https://exchange.xforce.ibmcloud.com/vulnerabilities/25097 •

CVSS: 7.5EPSS: 5%CPEs: 6EXPL: 2

Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags. • https://www.exploit-db.com/exploits/26479 http://secunia.com/advisories/17450 http://securityreason.com/securityalert/155 http://www.osvdb.org/20677 http://www.securityfocus.com/archive/1/415968 http://www.securityfocus.com/bid/15347 https://exchange.xforce.ibmcloud.com/vulnerabilities/22971 •