3 results (0.015 seconds)

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 0

Stack-based buffer overflow in AhnLab V3Pro 2004 build 6.0.0.383, V3 VirusBlock 2005 build 6.0.0.383, and V3Net for Windows Server 6.0 build 6.0.0.383 allows remote attackers to execute arbitrary code via a long filname in an ACE archive. • http://info.ahnlab.com/english/advisory/01.html http://marc.info/?l=bugtraq&m=112680062609377&w=2 http://secunia.com/advisories/15674 http://secunia.com/secunia_research/2005-17/advisory http://www.securityfocus.com/bid/14844 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Directory traversal vulnerability in the archive decompression library in AhnLab V3Pro 2004 build 6.0.0.383, V3 VirusBlock 2005 build 6.0.0.383, and V3Net for Windows Server 6.0 build 6.0.0.383 allows remote attackers to write arbitrary files via a .. (dot dot) in the filename in a compressed archive. • http://info.ahnlab.com/english/advisory/01.html http://marc.info/?l=bugtraq&m=112680062609377&w=2 http://secunia.com/advisories/15674 http://secunia.com/secunia_research/2005-17/advisory http://www.securityfocus.com/bid/14848 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

The v3flt2k.sys driver in AhnLab V3Pro 2004 Build 6.0.0.383, V3 VirusBlock 2005 Build 6.0.0.383, V3Net for Windows Server 6.0 Build 6.0.0.383 does not properly validate the source of the DeviceIoControl commands, which allows remote attackers to gain privileges. • http://info.ahnlab.com/english/advisory/01.html http://marc.info/?l=bugtraq&m=112680062609377&w=2 http://secunia.com/advisories/15674 http://www.securityfocus.com/bid/14847 https://exchange.xforce.ibmcloud.com/vulnerabilities/22297 •