Page 3 of 35 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 20EXPL: 0

Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote attackers to bypass malware detection via a crafted RAR archive. NOTE: this might be related to CVE-2008-0792. Múltiples productos antivirus de F-Secure, incluyendo Internet Security de 2006 a 2008, Anti-Virus de 2006 a 2008, F-Secure Protection Service y otros, permiten a atacantes remotos evitar las detecciones del malware a través de un archivo RAR manipulado. NOTA: podría estar relacionado con CVE-2008-0792. • http://secunia.com/advisories/28919 http://www.f-secure.com/security/fsc-2008-1.shtml http://www.securitytracker.com/id?1019405 http://www.securitytracker.com/id?1019412 http://www.securitytracker.com/id?1019413 http://www.vupen.com/english/advisories/2008/0544/references https://exchange.xforce.ibmcloud.com/vulnerabilities/40480 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.8EPSS: 0%CPEs: 20EXPL: 0

Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote attackers to bypass malware detection via a crafted CAB archive. Múltiples productos antivirus F-Secure, incluyendo Internet Security 2006 hasta 2008, Anti-Virus 2006 hasta 2008, F-Secure Protection Service y otros, permiten a los atacantes remotos omitir la detección de malware por medio de un archivo CAB diseñado. • http://secunia.com/advisories/28919 http://www.f-secure.com/security/fsc-2008-1.shtml http://www.securitytracker.com/id?1019405 http://www.securitytracker.com/id?1019412 http://www.securitytracker.com/id?1019413 http://www.vupen.com/english/advisories/2008/0544/references https://exchange.xforce.ibmcloud.com/vulnerabilities/40480 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

F-Secure Anti-Virus for Windows Servers 7.0 64-bit edition allows local users to bypass virus scanning by using the system32 directory to store a crafted (1) archive or (2) packed executable. NOTE: in many environments, this does not cross privilege boundaries because any process able to write to system32 could also shut off F-Secure Anti-Virus. El antivirus F-Secure para Windows Servers 7.0 en la edición de 64-bit permite a usuarios locales evitar el escaneo de los virus utilizando el directorio system32 para almacenar un (1) archivo o (2) ejecutable paquetizado manipulados. NOTA: en muchos entornos, esto no traspasa los límites de los privilegios puesto que cualquier proceso que pueda escribir en el system32 puede también apagar el antivirus F-Secure. • http://osvdb.org/41377 http://secunia.com/advisories/26948 http://www.f-secure.com/security/fsc-2007-6.shtml http://www.securityfocus.com/bid/25824 http://www.securitytracker.com/id?1018745 http://www.vupen.com/english/advisories/2007/3277 https://exchange.xforce.ibmcloud.com/vulnerabilities/36833 •

CVSS: 9.3EPSS: 3%CPEs: 58EXPL: 0

Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive. Múltiples productos antivirus de F-Secure para Microsoft Windows y Linux anterior al 19/06/2007 permiten a atacantes remotos evitar el escaneo mediante una cabecera artesanal en un archivo (1) LHA o (2) RAR. • http://osvdb.org/36728 http://osvdb.org/36729 http://secunia.com/advisories/25738 http://www.f-secure.com/security/fsc-2007-5.shtml http://www.securityfocus.com/bid/24525 http://www.securitytracker.com/id?1018266 http://www.securitytracker.com/id?1018267 http://www.securitytracker.com/id?1018268 http://www.vupen.com/english/advisories/2007/2247 https://exchange.xforce.ibmcloud.com/vulnerabilities/34942 •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and "access validation of the address space." Vulnerabilidad sin especificar en el componente Real-time Scanning en múltiples productos de F-Secure, incluyendo Internet Security 2005, 2006 y2007; Anti-Virus 2005, 2006 y 2007 y Solutions basadas en F-Secure Protection Service for Consumers 6.40 y versiones anteriores permite a usuarios locales obtener privilegios a través de paquetes de petición I/O (IRP) manipulados, relacionado con el IOCTL (Control de Entrada/Salida) y "Validación del acceso al espacio de direcciones". • http://osvdb.org/36727 http://secunia.com/advisories/25439 http://www.f-secure.com/security/fsc-2007-2.shtml http://www.securitytracker.com/id?1018146 http://www.securitytracker.com/id?1018148 http://www.vupen.com/english/advisories/2007/1985 https://exchange.xforce.ibmcloud.com/vulnerabilities/34579 •