CVE-2001-1548
https://notcve.org/view.php?id=CVE-2001-1548
ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters. • http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.html http://archives.neohapsis.com/archives/bugtraq/2001-12/0065.html http://www.iss.net/security_center/static/7671.php http://www.securityfocus.com/bid/3647 •
CVE-2001-1373
https://notcve.org/view.php?id=CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and earlier and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote attackers to send potentially dangerous attachments. • http://www.securityfocus.com/archive/1/197681 http://www.securityfocus.com/bid/3055 http://www.zonelabs.com/products/zap/rel_history.html#2.6.362 https://exchange.xforce.ibmcloud.com/vulnerabilities/6877 •
CVE-2000-0339 – Zone Labs ZoneAlarm 2.1 Personal Firewall - Port 67
https://notcve.org/view.php?id=CVE-2000-0339
ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules. • https://www.exploit-db.com/exploits/19871 http://www.osvdb.org/1294 http://www.securityfocus.com/bid/1137 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000421044123.2353.qmail%40securityfocus.com •
CVE-2000-0220
https://notcve.org/view.php?id=CVE-2000-0220
ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0220 •