Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:02
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/17450 - Vendor Advisory | |
| References | () http://securityreason.com/securityalert/155 - | |
| References | () http://www.osvdb.org/20677 - | |
| References | () http://www.securityfocus.com/archive/1/415968 - | |
| References | () http://www.securityfocus.com/bid/15347 - Exploit | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22971 - | 
Information
                Published : 2005-11-16 07:42
Updated : 2025-04-03 01:03
NVD link : CVE-2005-3560
Mitre link : CVE-2005-3560
CVE.ORG link : CVE-2005-3560
JSON object : View
Products Affected
                zonelabs
- zonealarm_antivirus
- zonealarm
- zonealarm_security_suite
- zonealarm_anti-spyware
CWE
                