Vulnerabilities > Zonelabs > Zonealarm Security Suite

DATE CVE VULNERABILITY TITLE RISK
2006-07-13 CVE-2006-3540 Local Denial Of Service vulnerability in Zonelabs Zonealarm Security Suite 6.1.737.000/6.5.722.000
Check Point Zone Labs ZoneAlarm Internet Security Suite 6.5.722.000, 6.1.737.000, and possibly other versions do not properly validate RegSaveKey, RegRestoreKey, and RegDeleteKey function calls, which allows local users to cause a denial of service (system crash) via a certain combination of these function calls with an HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VETFDDNT\Enum argument.
local
low complexity
zonelabs
4.9
2006-03-14 CVE-2006-1221 Local Privilege Escalation vulnerability in Zonelabs Zonealarm Security Suite 6.1.744.000
Untrusted search path vulnerability in the TrueVector service (VSMON.exe) in Zone Labs ZoneAlarm 6.x and Integrity does not search ZoneAlarm's own folders before other folders that are specified in a user's PATH, which might allow local users to execute code as SYSTEM by placing malicious DLLs into a folder that has insecure permissions, but is searched before ZoneAlarm's folder.
local
high complexity
zonelabs
6.2
2005-11-16 CVE-2005-3560 Unspecified vulnerability in Zonelabs products
Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags.
network
low complexity
zonelabs
7.5