Page 2 of 21 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in F-Secure Anti-Virus Client Security 6.02 allows local users to cause a denial of service and possibly gain privileges via format string specifiers in the Management Server name field on the Communication settings page. Vulnerabilidad de cadena de formato en F-Secure Anti-Virus Client Security 6.02 permite a usuarios locales provocar denegación de servicio y posiblemente ganar privilegos a través de especificaciones de formato de cadena en el campo nombre de Management Server sobre la página de configuración de la comunicación. • http://osvdb.org/34764 http://securityreason.com/securityalert/2472 http://www.layereddefense.com/F-SecureMar18.html http://www.securityfocus.com/archive/1/463190/100/0/threaded http://www.securityfocus.com/bid/23023 http://www.vupen.com/english/advisories/2007/1055 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

F-Secure Anti-Virus for Linux Gateways 4.65 allows remote attackers to cause a denial of service (possibly fatal scan error), and possibly bypass virus detection, by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. F-Secure Anti-Virus para Linux Gateways 4.65 permite a atacantes remotos provocar una denegación de servicio (posiblemente error fatal de escaneado), y posiblemente evitar una detección de virus, insertando caracteres inválidos en un contenido codificado base 64 en un fichero MIME multipart/mixed, como se demuestra con el fichero de testeo EICAR. • http://www.quantenblog.net/security/virus-scanner-bypass http://www.securityfocus.com/archive/1/453654/100/0/threaded http://www.securityfocus.com/bid/21461 •

CVSS: 5.0EPSS: 4%CPEs: 16EXPL: 0

F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier does not scan files contained on removable media when "Scan network drives" is disabled, which allows remote attackers to bypass anti-virus controls. F-Secure Anti-Virus 2003 a 2006 y otras versiones, Internet Security 2003 a 2006 y Service Platform for Service Providers 6.x y anteriores no escanean archivos ubicados en medios extraíbles cuando la opción "Escanear Unidades de Red" está deshabilitada, lo cual permite a atacantes remotos evitar el control de los antivirus. • http://secunia.com/advisories/20858 http://securitytracker.com/id?1016400 http://securitytracker.com/id?1016401 http://www.f-secure.com/security/fsc-2006-4.shtml http://www.osvdb.org/26876 http://www.securityfocus.com/bid/18693 http://www.vupen.com/english/advisories/2006/2573 https://exchange.xforce.ibmcloud.com/vulnerabilities/27502 •

CVSS: 5.0EPSS: 4%CPEs: 16EXPL: 0

F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier allows remote attackers to bypass anti-virus scanning via a crafted filename. F-Secure Anti-Virus de 2003 a 2006 y otras versiones, Internet Security de 2003 a 2006 y Service Platform para Service Providers 6.x y anteriores permite a atacantes remotos evitar la búsqueda antivirus a través de un nombre de archivo manipulado. • http://secunia.com/advisories/20858 http://securitytracker.com/id?1016400 http://securitytracker.com/id?1016401 http://www.f-secure.com/security/fsc-2006-4.shtml http://www.osvdb.org/26875 http://www.securityfocus.com/bid/18693 http://www.vupen.com/english/advisories/2006/2573 https://exchange.xforce.ibmcloud.com/vulnerabilities/27498 •

CVSS: 7.5EPSS: 17%CPEs: 63EXPL: 0

Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives. • http://secunia.com/advisories/18529 http://securitytracker.com/id?1015507 http://securitytracker.com/id?1015508 http://securitytracker.com/id?1015509 http://securitytracker.com/id?1015510 http://www.ciac.org/ciac/bulletins/q-103.shtml http://www.f-secure.com/security/fsc-2006-1.shtml http://www.osvdb.org/22632 http://www.securityfocus.com/bid/16309 http://www.vupen.com/english/advisories/2006/0257 https://exchange.xforce.ibmcloud.com/vulnerabilities/24198 •