Page 4 of 32 results (0.008 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

F-Secure Anti-Virus for Linux Gateways 4.65 allows remote attackers to cause a denial of service (possibly fatal scan error), and possibly bypass virus detection, by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. F-Secure Anti-Virus para Linux Gateways 4.65 permite a atacantes remotos provocar una denegación de servicio (posiblemente error fatal de escaneado), y posiblemente evitar una detección de virus, insertando caracteres inválidos en un contenido codificado base 64 en un fichero MIME multipart/mixed, como se demuestra con el fichero de testeo EICAR. • http://www.quantenblog.net/security/virus-scanner-bypass http://www.securityfocus.com/archive/1/453654/100/0/threaded http://www.securityfocus.com/bid/21461 •

CVSS: 5.0EPSS: 4%CPEs: 16EXPL: 0

F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier allows remote attackers to bypass anti-virus scanning via a crafted filename. F-Secure Anti-Virus de 2003 a 2006 y otras versiones, Internet Security de 2003 a 2006 y Service Platform para Service Providers 6.x y anteriores permite a atacantes remotos evitar la búsqueda antivirus a través de un nombre de archivo manipulado. • http://secunia.com/advisories/20858 http://securitytracker.com/id?1016400 http://securitytracker.com/id?1016401 http://www.f-secure.com/security/fsc-2006-4.shtml http://www.osvdb.org/26875 http://www.securityfocus.com/bid/18693 http://www.vupen.com/english/advisories/2006/2573 https://exchange.xforce.ibmcloud.com/vulnerabilities/27498 •

CVSS: 5.0EPSS: 4%CPEs: 16EXPL: 0

F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier does not scan files contained on removable media when "Scan network drives" is disabled, which allows remote attackers to bypass anti-virus controls. F-Secure Anti-Virus 2003 a 2006 y otras versiones, Internet Security 2003 a 2006 y Service Platform for Service Providers 6.x y anteriores no escanean archivos ubicados en medios extraíbles cuando la opción "Escanear Unidades de Red" está deshabilitada, lo cual permite a atacantes remotos evitar el control de los antivirus. • http://secunia.com/advisories/20858 http://securitytracker.com/id?1016400 http://securitytracker.com/id?1016401 http://www.f-secure.com/security/fsc-2006-4.shtml http://www.osvdb.org/26876 http://www.securityfocus.com/bid/18693 http://www.vupen.com/english/advisories/2006/2573 https://exchange.xforce.ibmcloud.com/vulnerabilities/27502 •

CVSS: 7.6EPSS: 5%CPEs: 5EXPL: 0

Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host. • http://secunia.com/advisories/20407 http://securitytracker.com/id?1016196 http://securitytracker.com/id?1016197 http://www.f-secure.com/security/fsc-2006-3.shtml http://www.vupen.com/english/advisories/2006/2076 https://exchange.xforce.ibmcloud.com/vulnerabilities/26799 •

CVSS: 5.0EPSS: 1%CPEs: 54EXPL: 0

Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned. • http://secunia.com/advisories/18529 http://securitytracker.com/id?1015507 http://securitytracker.com/id?1015508 http://securitytracker.com/id?1015509 http://securitytracker.com/id?1015510 http://www.ciac.org/ciac/bulletins/q-103.shtml http://www.f-secure.com/security/fsc-2006-1.shtml http://www.osvdb.org/22633 http://www.securityfocus.com/bid/16309 http://www.vupen.com/english/advisories/2006/0257 https://exchange.xforce.ibmcloud.com/vulnerabilities/24199 •