Known Vulnerabilities for Blackice Pc Protection by Iss

Listed below are 10 of the newest known vulnerabilities associated with "Blackice Pc Protection" by "Iss".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2006-7129 ISS BlackICE PC Protection 3.6 cpj and cpu, and possibly earlier versions, allows local users to bypass the protection scheme... 2.1 - LOW 2007-03-06 2018-10-16
CVE-2006-4541 RapDrv.sys in BlackICE PC Protection 3.6.cpn, cpj, cpiE, and possibly 3.6 and earlier, allows local users to cause a denial o... 4.6 - MEDIUM 2006-09-05 2018-10-17
CVE-2006-3999 ISS BlackICE PC Protection 3.6.cpj, 3.6.cpiE, and possibly earlier versions do not properly monitor the integrity of the pamv... 4.6 - MEDIUM 2006-08-05 2018-10-17
CVE-2006-3840 The SMB Mailslot parsing functionality in PAM in multiple ISS products with XPU (24.39/1.78/epj/x.x.x.1780), including Proven... 5 - MEDIUM 2006-07-27 2018-10-17
CVE-2005-2711 ISS BlackIce 3.6, as used in multiple products including BlackICE PC Protection, Server Protection, Agent for Server, and Rea... 7.2 - HIGH 2005-12-31 2017-07-11
CVE-2004-2126 The upgrade for BlackICE PC Protection 3.6 and earlier sets insecure permissions for .INI files such as (1) blackice.ini, (2)... 4.6 - MEDIUM 2004-12-31 2016-10-18
CVE-2004-2125 Buffer overflow in blackd.exe for BlackICE PC Protection 3.6 and other versions before 3.6.ccb, with application protection o... 4.6 - MEDIUM 2004-12-31 2017-07-11
CVE-2004-1714 BlackICE PC Protection and Server Protection installs (1) firewall.ini, (2) blackice.ini, (3) sigs.ini and (4) protect.ini wi... 7.1 - HIGH 2004-08-11 2024-01-26
CVE-2004-0362 Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as use... 7.5 - HIGH 2004-04-15 2017-07-11
CVE-2004-0193 Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 a... 7.5 - HIGH 2004-03-15 2017-10-10

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationIssBlackice Pc Protection3.6cpuAllAllAll
ApplicationIssBlackice Pc Protection3.6cpnAllAllAll
ApplicationIssBlackice Pc Protection3.6cpkAllAllAll
ApplicationIssBlackice Pc Protection3.6cpjAllAllAll
ApplicationIssBlackice Pc Protection3.6cpieAllAllAll
ApplicationIssBlackice Pc Protection3.6ccgAllAllAll
ApplicationIssBlackice Pc Protection3.6ccfAllAllAll
ApplicationIssBlackice Pc Protection3.6cceAllAllAll
ApplicationIssBlackice Pc Protection3.6ccdAllAllAll
ApplicationIssBlackice Pc Protection3.6cccAllAllAll
ApplicationIssBlackice Pc Protection3.6ccbAllAllAll
ApplicationIssBlackice Pc Protection3.6ccaAllAllAll
ApplicationIssBlackice Pc Protection3.6cbzAllAllAll
ApplicationIssBlackice Pc Protection3.6cbrAllAllAll
ApplicationIssBlackice Pc Protection3.6cbdAllAllAll
ApplicationIssBlackice Pc Protection3.6AllAllAll
ApplicationIssBlackice Pc Protection-AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report