Page 2 of 26 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2004 — The upgrade for BlackICE PC Protection 3.6 and earlier sets insecure permissions for .INI files such as (1) blackice.ini, (2) firewall.ini, (3) protect.ini, or (4) sigs.ini, which allows local users to modify BlackICE configuration or possibly execute arbitrary code by exploiting vulnerabilities in the .INI parsers. • http://marc.info/?l=bugtraq&m=107530966524193&w=2 •

CVSS: 7.1EPSS: 0%CPEs: 21EXPL: 2

11 Aug 2004 — BlackICE PC Protection and Server Protection installs (1) firewall.ini, (2) blackice.ini, (3) sigs.ini and (4) protect.ini with Everyone Full Control permissions, which allows local users to cause a denial of service (crash) or modify configuration, as demonstrated by modifying firewall.ini to contain a large firewall rule. • https://www.exploit-db.com/exploits/24362 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 9.8EPSS: 75%CPEs: 109EXPL: 3

23 Mar 2004 — Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm. Múltiples desbordamientos de búfer basado en la pila en las... • https://www.exploit-db.com/exploits/16464 •

CVSS: 9.8EPSS: 32%CPEs: 14EXPL: 0

15 Mar 2004 — Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username. Desbordamiento de búfer basado en la pila en el Módulo de análisis ... • http://marc.info/?l=bugtraq&m=107789851117176&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

31 Dec 2003 — BlackICE Defender 2.9.cap and Server Protection 3.5.cdf, when configured to automatically block attacks, allows remote attackers to block IP addresses and cause a denial of service via spoofed packets. • http://online.securityfocus.com/archive/1/294411 •

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

03 Sep 2003 — Unknown vulnerability in an ISAPI plugin for ISS Server Sensor 7.0 XPU 20.16, 20.18, and possibly other versions before 20.19, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code in Internet Information Server (IIS) via a certain URL through SSL. • http://marc.info/?l=bugtraq&m=106278164225389&w=2 •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 0

24 Sep 2002 — Buffer overflow in the parsing mechanism for ISS Internet Scanner 6.2.1, when using the license banner HTTP check, allows remote attackers to execute arbitrary code via a long web server response. • http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21165 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

31 Aug 2002 — BlackICE Agent 3.1.eal does not always reactivate after a system standby, which could allow remote attackers and local users to bypass intended firewall restrictions. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0090.html •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

31 Aug 2002 — The default configuration of BlackICE Agent 3.1.eal and 3.1.ebh has a high tcp.maxconnections setting, which could allow remote attackers to cause a denial of service (memory consumption) via a large number of connections to the BlackICE system that consumes more resources than intended by the user. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0114.html •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

11 Jun 2002 — ISS RealSecure for Nokia devices before IPSO build 6.0.2001.141d is configured to allow a user "skank" on a machine "starscream" to become a key manager when the "first time connection" feature is enabled and before any legitimate administrators have connected, which could allow remote attackers to gain access to the device during installation. • http://marc.info/?l=bugtraq&m=101666833321138&w=2 •