Vulnerabilities > F Secure > Safe
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-03-06 | CVE-2021-44749 | Cross-site Scripting vulnerability in F-Secure Safe 18.5 A vulnerability affecting F-Secure SAFE browser protection was discovered improper URL handling can be triggered to cause universal cross-site scripting through browsing protection in a SAFE web browser. | 9.6 |
2021-12-16 | CVE-2021-40835 | Unspecified vulnerability in F-Secure Safe 17.7.260301/17.8.264411 An URL Address bar spoofing vulnerability was discovered in Safe Browser for iOS. | 4.3 |
2021-12-10 | CVE-2021-40834 | Improper Restriction of Rendered UI Layers or Frames vulnerability in F-Secure Safe 17.9 A user interface overlay vulnerability was discovered in F-secure SAFE Browser for Android. | 4.3 |
2021-08-11 | CVE-2021-33594 | Unspecified vulnerability in F-Secure Safe 17.9 An address bar spoofing vulnerability was discovered in Safe Browser for Android. | 3.5 |
2021-08-11 | CVE-2021-33595 | Unspecified vulnerability in F-Secure Safe A address bar spoofing vulnerability was discovered in Safe Browser for iOS. | 3.5 |
2021-08-05 | CVE-2021-33596 | Improper Restriction of Rendered UI Layers or Frames vulnerability in F-Secure Safe Showing the legitimate URL in the address bar while loading the content from other domain. | 4.1 |
2020-06-23 | CVE-2020-14978 | Unspecified vulnerability in F-Secure Safe 17.7 An issue was discovered in F-Secure SAFE 17.7 on macOS. | 8.1 |
2020-06-23 | CVE-2020-14977 | Unspecified vulnerability in F-Secure Safe 17.7 An issue was discovered in F-Secure SAFE 17.7 on macOS. | 8.1 |
2019-05-17 | CVE-2019-11644 | Uncontrolled Search Path Element vulnerability in F-Secure products In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. | 7.8 |