Page 2 of 27 results (0.002 seconds)

CVSS: 7.8EPSS: 6%CPEs: 63EXPL: 0

21 Jan 2006 — Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives. • http://secunia.com/advisories/18529 •

CVSS: 7.5EPSS: 2%CPEs: 54EXPL: 0

21 Jan 2006 — Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned. • http://secunia.com/advisories/18529 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

02 Nov 2005 — Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files. • http://secunia.com/advisories/17361 •

CVSS: 8.8EPSS: 3%CPEs: 20EXPL: 0

11 Feb 2005 — Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive. • http://www.f-secure.com/security/fsc-2005-1.shtml •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

31 Dec 2004 — Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive. • http://secunia.com/advisories/11712 •

CVSS: 7.7EPSS: 18%CPEs: 44EXPL: 1

31 Dec 2004 — Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system. • https://www.exploit-db.com/exploits/629 •

CVSS: 7.5EPSS: 0%CPEs: 22EXPL: 0

24 Sep 2004 — Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients. Múltiples pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan múltiples campos MIME con el mismo nombre, lo que puede ser interpretado de manera distinta por clientes de correo. • http://marc.info/?l=bugtraq&m=109517732328759&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 22EXPL: 0

24 Sep 2004 — Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients. Múltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan espacios en blanco de manera inusual, lo que puede ser interpretado diferentemente por clientes de correo. • http://marc.info/?l=bugtraq&m=109525252118936&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 22EXPL: 0

24 Sep 2004 — Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients. Múltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de cont... • http://marc.info/?l=bugtraq&m=109521027007616&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 22EXPL: 0

24 Sep 2004 — Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients. Múltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan valores Content-Tra... • http://marc.info/?l=bugtraq&m=109517788100063&w=2 •