CVE-2002-1911 – Zone Labs ZoneAlarm 3.0/3.1 - Syn Flood Denial of Service
https://notcve.org/view.php?id=CVE-2002-1911
ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue. • https://www.exploit-db.com/exploits/21943 http://archives.neohapsis.com/archives/bugtraq/2002-10/0238.html http://www.iss.net/security_center/static/10379.php http://www.securityfocus.com/archive/1/295434 http://www.securityfocus.com/bid/5975 •
CVE-2002-1997
https://notcve.org/view.php?id=CVE-2002-1997
ZoneAlarm Pro 3.0 MailSafe allows remote attackers to bypass filtering and possibly execute arbitrary code via email attachments containing a trailing dot after the file extension. • http://www.securityfocus.com/archive/1/265387 http://www.securityfocus.com/bid/4407 https://exchange.xforce.ibmcloud.com/vulnerabilities/8744 •
CVE-2001-1548
https://notcve.org/view.php?id=CVE-2001-1548
ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters. • http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.html http://archives.neohapsis.com/archives/bugtraq/2001-12/0065.html http://www.iss.net/security_center/static/7671.php http://www.securityfocus.com/bid/3647 •
CVE-2001-1373
https://notcve.org/view.php?id=CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and earlier and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote attackers to send potentially dangerous attachments. • http://www.securityfocus.com/archive/1/197681 http://www.securityfocus.com/bid/3055 http://www.zonelabs.com/products/zap/rel_history.html#2.6.362 https://exchange.xforce.ibmcloud.com/vulnerabilities/6877 •
CVE-2000-0339 – Zone Labs ZoneAlarm 2.1 Personal Firewall - Port 67
https://notcve.org/view.php?id=CVE-2000-0339
ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules. • https://www.exploit-db.com/exploits/19871 http://www.osvdb.org/1294 http://www.securityfocus.com/bid/1137 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000421044123.2353.qmail%40securityfocus.com •