CVE-2005-3560

N/A Unknown
Published: November 16, 2005 Modified: April 16, 2026
View on NVD

Description

Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/17450
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/20677
Source: cve@mitre.org
http://www.securityfocus.com/bid/15347
Source: cve@mitre.org
Exploit
http://secunia.com/advisories/17450
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/155
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/20677
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/415968
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15347
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/22971
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.4%
89th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

zonelabs