Show plain JSON{"id": "CVE-2001-1548", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2001-12-31T05:00:00.000", "references": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.html", "tags": ["Exploit", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2001-12/0065.html", "source": "cve@mitre.org"}, {"url": "http://www.iss.net/security_center/static/7671.php", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/3647", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.html", "tags": ["Exploit", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2001-12/0065.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.iss.net/security_center/static/7671.php", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/3647", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:zonelabs:zonealarm:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDDB6978-A1C6-4DCD-86F0-55005D4CF292"}, {"criteria": "cpe:2.3:a:zonelabs:zonealarm:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE79F675-8577-45AC-A1EB-34C8805CC802"}, {"criteria": "cpe:2.3:a:zonelabs:zonealarm:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B7CA67C-34AC-4717-8E86-1A8D3D00046B"}, {"criteria": "cpe:2.3:a:zonelabs:zonealarm:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2180CF4C-5124-4097-B7DE-C5C5F38E0B87"}, {"criteria": "cpe:2.3:a:zonelabs:zonealarm:2.4:*:pro:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "161A802C-60DE-4A8E-BDBA-771C3123AEBB"}, {"criteria": "cpe:2.3:a:zonelabs:zonealarm:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FE589FD-0C87-4057-BA5E-326727E0EDA8"}, {"criteria": "cpe:2.3:a:zonelabs:zonealarm:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44DD1537-11DD-4C7F-810A-674245E7EAFF"}, {"criteria": "cpe:2.3:a:zonelabs:zonealarm:2.6:*:pro:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F35E472-2E14-4F37-9D2C-BFBA543184AD"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}