Total vulnerabilities in the database
Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive.
Software | From | Fixed in |
---|---|---|
f-secure / f-secure_anti-virus | - | 5.01.x |
f-secure / f-secure_anti-virus | 5.5 | 5.5.x |
f-secure / f-secure_anti-virus | - | 4.52.x |
f-secure / f-secure_anti-virus | - | 6.2.x |
f-secure / f-secure_anti-virus | - | 5.43.x |
f-secure / f-secure_anti-virus | 2005 | 2005.x |
f-secure / f-secure_anti-virus | - | 5.55.x |
f-secure / f-secure_anti-virus | - | 4.61.x |
f-secure / f-secure_anti-virus | 2004 | 2004.x |
f-secure / f-secure_anti-virus | - | 5.51.x |
f-secure / f-secure_internet_security | 2005 | 2005.x |
f-secure / internet_gatekeeper | 2.06 | 2.06.x |
f-secure / f-secure_personal_express | - | 5.10.x |
f-secure / f-secure_internet_security | 2004 | 2004.x |
f-secure / f-secure_anti-virus | - | 5.5.x |
f-secure / f-secure_anti-virus | 4.60 | 4.60.x |
f-secure / f-secure_anti-virus | - | 6.31.x |
f-secure / internet_gatekeeper | - | 6.41.x |