CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
32466 | CVE-2008-2349 | Candidate | Zomplog 3.8.2 and earlier allows remote attackers to gain administrative access by creating an admin account via a direct request to install/newuser.php with the admin parameter set to 1. | Assigned (20080520) | None (candidate not yet proposed) | View | |
14766 | CVE-2005-3560 | Candidate | Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags. | Assigned (20051116) | None (candidate not yet proposed) | View | |
9945 | CVE-2004-1517 | Candidate | Zone Labs IMsecure and IMsecure Pro before 1.5 allow remote attackers to bypass Active Link Filtering via an instant message containing a URL with hex encoded file extenstions. | Assigned (20050218) | None (candidate not yet proposed) | View | |
4348 | CVE-2001-1548 | Candidate | ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters. | Assigned (20050714) | None (candidate not yet proposed) | View | |
1917 | CVE-2000-0339 | Entry | ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules. | View |
Page 20928 of 20943, showing 5 records out of 104715 total, starting on record 104636, ending on 104640