Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/17450 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/155 - | |
References | () http://www.osvdb.org/20677 - | |
References | () http://www.securityfocus.com/archive/1/415968 - | |
References | () http://www.securityfocus.com/bid/15347 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22971 - |
Information
Published : 2005-11-16 07:42
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3560
Mitre link : CVE-2005-3560
CVE.ORG link : CVE-2005-3560
JSON object : View
Products Affected
zonelabs
- zonealarm_anti-spyware
- zonealarm_antivirus
- zonealarm
- zonealarm_security_suite
CWE