Page 11 of 123 results (0.062 seconds)

CVSS: 7.5EPSS: 2%CPEs: 54EXPL: 0

21 Jan 2006 — Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned. • http://secunia.com/advisories/18529 •

CVSS: 7.8EPSS: 8%CPEs: 4EXPL: 0

18 Nov 2005 — Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file. • http://secunia.com/advisories/17130 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

16 Nov 2005 — suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege. Los scritps suid.cgi en F-Secure (1) Internet Gatekeeper para Linux anteriores a 2.15.484 y (2) Anti-Virus Linux Gateway anteriores a 2.16 son instalados con SUID y con permiso de ejecución para todo el mundo, lo que permite a usuarios locales ganar privilegios. • https://www.exploit-db.com/exploits/1297 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

02 Nov 2005 — Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files. • http://secunia.com/advisories/17361 •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

02 Sep 2005 — WRQ Reflection for Secure IT Windows Server 6.0 (formerly known as F-Secure SSH server) processes access and deny lists in a case-sensitive manner, when previous versions were case-insensitive, which might allow remote attackers to bypass intended restrictions and login to accounts that should be denied. • http://secunia.com/advisories/16649 •

CVSS: 8.8EPSS: 3%CPEs: 20EXPL: 0

11 Feb 2005 — Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive. • http://www.f-secure.com/security/fsc-2005-1.shtml •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2004 — Unknown vulnerability in F-Secure Anti-Virus (FSAV) 4.52 for Linux before Hotfix 3 allows the Sober.D worm to bypass FASV. • http://secunia.com/advisories/11089 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2004 — F-Secure Anti-Virus for Microsoft Exchange 6.30 and 6.31 does not properly detect certain password-protected files in a ZIP file, which allows remote attackers to bypass anti-virus protection. • ftp://ftp.f-secure.com/support/hotfix/fsav-mse/fsavmse63x-02_readme.txt •

CVSS: 9.1EPSS: 0%CPEs: 6EXPL: 0

31 Dec 2004 — F-Secure Anti-Virus 5.41 and 5.42 on Windows, Client Security 5.50 and 5.52, 4.60 for Samba Servers, and 4.52 and earlier for Linux does not properly detect certain viruses in a PKZip archive, which allows viruses such as Sober.D and Sober.G to bypass initial detection. • http://secunia.com/advisories/11699 •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

31 Dec 2004 — Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive. • http://secunia.com/advisories/11712 •