Vulnerabilities > Zonelabs > Zonealarm Security Suite
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-07-13 | CVE-2006-3540 | Local Denial Of Service vulnerability in Zonelabs Zonealarm Security Suite 6.1.737.000/6.5.722.000 Check Point Zone Labs ZoneAlarm Internet Security Suite 6.5.722.000, 6.1.737.000, and possibly other versions do not properly validate RegSaveKey, RegRestoreKey, and RegDeleteKey function calls, which allows local users to cause a denial of service (system crash) via a certain combination of these function calls with an HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VETFDDNT\Enum argument. | 4.9 |
2006-03-14 | CVE-2006-1221 | Local Privilege Escalation vulnerability in Zonelabs Zonealarm Security Suite 6.1.744.000 Untrusted search path vulnerability in the TrueVector service (VSMON.exe) in Zone Labs ZoneAlarm 6.x and Integrity does not search ZoneAlarm's own folders before other folders that are specified in a user's PATH, which might allow local users to execute code as SYSTEM by placing malicious DLLs into a folder that has insecure permissions, but is searched before ZoneAlarm's folder. | 6.2 |
2005-11-16 | CVE-2005-3560 | Unspecified vulnerability in Zonelabs products Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags. | 7.5 |