Page 3 of 18 results (0.007 seconds)

CVSS: 7.5EPSS: 17%CPEs: 4EXPL: 0

Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file. • http://secunia.com/advisories/17130 http://secunia.com/advisories/17144 http://www.idefense.com/application/poi/display?id=318&type=vulnerabilities http://www.osvdb.org/19912 http://www.osvdb.org/19913 http://www.securityfocus.com/bid/15054 https://exchange.xforce.ibmcloud.com/vulnerabilities/22564 •

CVSS: 7.5EPSS: 3%CPEs: 20EXPL: 0

Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive. • http://www.f-secure.com/security/fsc-2005-1.shtml http://xforce.iss.net/xforce/alerts/id/188 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in F-Secure Anti-Virus (FSAV) 4.52 for Linux before Hotfix 3 allows the Sober.D worm to bypass FASV. • http://secunia.com/advisories/11089 http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-linux-hotfixes.shtml http://www.kb.cert.org/vuls/id/415734 https://exchange.xforce.ibmcloud.com/vulnerabilities/15432 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

F-Secure Anti-Virus 5.41 and 5.42 on Windows, Client Security 5.50 and 5.52, 4.60 for Samba Servers, and 4.52 and earlier for Linux does not properly detect certain viruses in a PKZip archive, which allows viruses such as Sober.D and Sober.G to bypass initial detection. • http://secunia.com/advisories/11699 http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-linux-hotfixes.shtml http://support.f-secure.de/ger/home/downloads/hotfixes/av5-hotfixes.shtml http://www.osvdb.org/6409 https://exchange.xforce.ibmcloud.com/vulnerabilities/16243 •

CVSS: 6.4EPSS: 0%CPEs: 11EXPL: 0

Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive. • http://secunia.com/advisories/11712 http://www.f-secure.com/security/fsc-2004-1.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/16258 •