The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of F-Secure Anti-Virus

F-Secure Anti-Virus: executing DLL code via the installer
An attacker can create a malicious install DLL, and then put it in the current directory of F-Secure Anti-Virus, in order to execute code...
CVE-2019-11644, FSC-2019-2, VIGILANCE-VUL-29346
F-Secure: memory corruption via Windows Endpoint Protection
An attacker can generate a memory corruption via Windows Endpoint Protection of F-Secure, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-269, FSC-2018-2, VIGILANCE-VUL-26299
Antivirus: privilege escalation via Microsoft Application Verifier
An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges...
1116957, CVE-2017-5565, CVE-2017-5566, CVE-2017-5567, CVE-2017-6186, CVE-2017-6417, VIGILANCE-VUL-22211
F-Secure AV: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on F-Secure AV, in order to read or write data in the session...
CVE-2016-9892-ERROR, CVE-2017-6466, VIGILANCE-VUL-22075
F-Secure Anti-Virus: privilege escalation via FSGK.SYS
A local attacker can use the FSGK.SYS driver of F-Secure Anti-Virus, in order to escalate his privileges...
FSC-2015-3, VIGILANCE-VUL-17793
SSL 3.0: decrypting session, POODLE
An attacker, located as a Man-in-the-Middle, can decrypt a SSL 3.0 session, in order to obtain sensitive information...
10923, 1589583, 1595265, 1653364, 1657963, 1663874, 1687167, 1687173, 1687433, 1687604, 1687611, 1690160, 1690185, 1690342, 1691140, 1692551, 1695392, 1696383, 1699051, 1700706, 2977292, 3009008, 7036319, aid-10142014, AST-2014-011, bulletinapr2015, bulletinjan2015, bulletinjan2016, bulletinjul2015, bulletinjul2016, bulletinoct2015, c04486577, c04487990, c04492722, c04497114, c04506802, c04510230, c04567918, c04616259, c04626982, c04676133, c04776510, CERTFR-2014-ALE-007, CERTFR-2014-AVI-454, CERTFR-2014-AVI-509, CERTFR-2015-AVI-169, CERTFR-2016-AVI-303, cisco-sa-20141015-poodle, cpujul2017, CTX216642, CVE-2014-3566, DSA-3053-1, DSA-3253-1, DSA-3489-1, ESA-2014-178, ESA-2015-098, ESXi500-201502001, ESXi500-201502101-SG, ESXi510-201503001, ESXi510-201503001-SG, ESXi510-201503101-SG, ESXi550-201501001, ESXi550-201501101-SG, FEDORA-2014-12989, FEDORA-2014-12991, FEDORA-2014-13012, FEDORA-2014-13017, FEDORA-2014-13040, FEDORA-2014-13069, FEDORA-2014-13070, FEDORA-2014-13444, FEDORA-2014-13451, FEDORA-2014-13764, FEDORA-2014-13777, FEDORA-2014-13781, FEDORA-2014-13794, FEDORA-2014-14234, FEDORA-2014-14237, FEDORA-2014-15379, FEDORA-2014-15390, FEDORA-2014-15411, FEDORA-2014-17576, FEDORA-2014-17587, FEDORA-2015-9090, FEDORA-2015-9110, FreeBSD-SA-14:23.openssl, FSC-2014-8, HPSBGN03256, HPSBGN03305, HPSBGN03332, HPSBHF03156, HPSBHF03300, HPSBMU03152, HPSBMU03184, HPSBMU03213, HPSBMU03416, HPSBUX03162, HPSBUX03194, JSA10656, MDVSA-2014:203, MDVSA-2014:218, MDVSA-2015:062, NetBSD-SA2014-015, nettcp_advisory, openSUSE-SU-2014:1331-1, openSUSE-SU-2014:1384-1, openSUSE-SU-2014:1395-1, openSUSE-SU-2014:1426-1, openSUSE-SU-2016:0640-1, openSUSE-SU-2016:1586-1, openSUSE-SU-2017:0980-1, PAN-SA-2014-0005, POODLE, RHSA-2014:1652-01, RHSA-2014:1653-01, RHSA-2014:1692-01, RHSA-2014:1920-01, RHSA-2014:1948-01, RHSA-2015:0010-01, RHSA-2015:0011-01, RHSA-2015:0012-01, RHSA-2015:1545-01, RHSA-2015:1546-01, SA83, SB10090, SB10104, sk102989, SOL15702, SP-CAAANKE, SP-CAAANST, SPL-91947, SPL-91948, SSA:2014-288-01, SSA-396873, SSA-472334, SSRT101767, STORM-2014-02-FR, SUSE-SU-2014:1357-1, SUSE-SU-2014:1361-1, SUSE-SU-2014:1386-1, SUSE-SU-2014:1387-1, SUSE-SU-2014:1387-2, SUSE-SU-2014:1409-1, SUSE-SU-2015:0010-1, SUSE-SU-2016:1457-1, SUSE-SU-2016:1459-1, T1021439, TSB16540, USN-2839-1, VIGILANCE-VUL-15485, VMSA-2015-0001, VMSA-2015-0001.1, VMSA-2015-0001.2, VN-2014-003, VU#577193
F-Secure Anti-Virus: SQL execution via an ActiveX
An attacker can invite the victim to display a malicious web site with Internet Explorer, to load an ActiveX installed by F-Secure Anti-Virus, in order to execute SQL queries on ODBC drivers...
BID-59443, CERTA-2013-AVI-273, CVE-2013-7369, FSC-2013-1, VIGILANCE-VUL-12716
F-Secure Anti-Virus: bypassing via ELF, EXE, RAR, TAR
An attacker can create an archive or a program containing a virus, which is not detected by F-Secure Anti-Virus...
BID-52581, BID-52589, BID-52591, BID-52598, BID-52612, BID-52614, BID-52623, BID-52626, CVE-2012-1429, CVE-2012-1430, CVE-2012-1431, CVE-2012-1442, CVE-2012-1443, CVE-2012-1459, CVE-2012-1461, CVE-2012-1463, VIGILANCE-VUL-11477
F-Secure Anti-Virus: code execution via fsresh.dll
An attacker can invite the victim to display a malicious HTML document calling the F-Secure Gadget Resource Handler ActiveX, in order to execute code on his computer...
BID-49293, FSC-2011-3, VIGILANCE-VUL-10948
F-Secure AV: code execution via DLL Preload
An attacker can use a malicious DLL in order to execute code in F-Secure Anti-Virus...
ASPR #2011-01-11-1, BID-45405, FSC-2010-4, VIGILANCE-VUL-10219
Our database contains other pages. You can request a free trial to read them.

Display information about F-Secure Anti-Virus: