![]() ![]() A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails in a loop.Ī Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the fsicapd component used in certain F-Secure products while scanning larger packages/fuzzed files consume too much memory eventually can crash the scanning engine. An attacker can potentially exploit Javascript window.open functionality in SAFE Browser which could lead address bar spoofing attacks.Ī vulnerability affecting F-Secure SAFE browser was discovered. The exploit can be triggered remotely by an attacker.Ī vulnerability affecting F-Secure SAFE browser was discovered. Multiple Denial-of-Service vulnerabilities was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files cause memory corruption and heap buffer overflow which eventually can crash the scanning engine. The exploit can be triggered remotely by an attacker. The exploit can be triggered remotely by an attacker.Ī Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. An attacker must have code execution rights on the victim machine prior to successful exploitation.Ī Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. This vulnerability allows local user to delete arbitrary file in the system and bypassing security protection which can be abused for local privilege escalation on affected F-Secure & WithSecure windows endpoint products. The exploit can be triggered remotely by an attacker.Ī Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aepack.dll component can crash the scanning engine.Ī Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed APK file it is possible that can crash the scanning engine. The exploit can be triggered remotely by an attacker.Ī Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files it is possible that can crash the scanning engine. The exploit can be triggered remotely by an attacker.Ī Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. This eventually leads to scanning engine crash. ![]() The exploit can be triggered remotely by an attacker.Ī Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This can lead to a possible scanning engine crash. It is possible that this can crash the scanning engine.Ī Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl unpack function crashes. It is possible that this can crash the scanning engineĪ Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.dll may go into an infinite loop when unpacking PE files. This can lead to a possible scanning engine crash.Ī Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. Multiple Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl.dll unpacker handler function crashes. Reflected cross-site scripting (XSS) vulnerabilities in WithSecure through ) exists within the F-Secure Policy Manager due to an unvalidated parameter in the endpoint, which allows remote attackers to provide a malicious input. Drag and drop operation by user on address bar could lead to a spoofing of the address bar. This can lead to a scanning engine crash, triggerable remotely by an attacker for denial of service.Īrbitrary file write in F-Secure Policy Manager through allows unauthenticated users to write the file with the contents in arbitrary locations on the F-Secure Policy Manager Server.Ī Drag and Drop spoof vulnerability was discovered in F-Secure SAFE Browser for Android and iOS version 19.0 and below. In F-Secure Endpoint Protection for Windows and macOS before channel with Capricorn database _07, the aerdl.dll unpacker handler crashes. F-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack.
0 Comments
Leave a Reply. |