Page 21 of 122 results (0.011 seconds)

CVSS: 7.5EPSS: 13%CPEs: 4EXPL: 0

Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file. • http://secunia.com/advisories/17130 http://secunia.com/advisories/17144 http://www.idefense.com/application/poi/display?id=318&type=vulnerabilities http://www.osvdb.org/19912 http://www.osvdb.org/19913 http://www.securityfocus.com/bid/15054 https://exchange.xforce.ibmcloud.com/vulnerabilities/22564 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege. Los scritps suid.cgi en F-Secure (1) Internet Gatekeeper para Linux anteriores a 2.15.484 y (2) Anti-Virus Linux Gateway anteriores a 2.16 son instalados con SUID y con permiso de ejecución para todo el mundo, lo que permite a usuarios locales ganar privilegios. • https://www.exploit-db.com/exploits/1297 http://secunia.com/advisories/17467 http://securitytracker.com/id?1015159 http://securitytracker.com/id?1015160 http://www.f-secure.com/security/fsc-2005-3.shtml http://www.osvdb.org/20513 http://www.osvdb.org/20537 http://www.osvdb.org/20538 http://www.osvdb.org/20539 http://www.osvdb.org/20540 http://www.osvdb.org/20541 http://www.osvdb.org/20542 http://www.osvdb.org/20543 http://www.osvdb.org/ •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files. • http://secunia.com/advisories/17361 http://securitytracker.com/id?1015142 http://securitytracker.com/id?1015143 http://www.f-secure.com/security/fsc-2005-2.shtml http://www.securityfocus.com/bid/15284 http://www.vupen.com/english/advisories/2005/2277 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

WRQ Reflection for Secure IT Windows Server 6.0 (formerly known as F-Secure SSH server) processes access and deny lists in a case-sensitive manner, when previous versions were case-insensitive, which might allow remote attackers to bypass intended restrictions and login to accounts that should be denied. • http://secunia.com/advisories/16649 http://securitytracker.com/id?1014835 http://support.wrq.com/techdocs/1910.html http://www.kb.cert.org/vuls/id/758054 •

CVSS: 7.5EPSS: 3%CPEs: 20EXPL: 0

Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive. • http://www.f-secure.com/security/fsc-2005-1.shtml http://xforce.iss.net/xforce/alerts/id/188 •