Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "AD54BC7B-CBD8-4D02-8820-95B2167F0582", "versionEndIncluding": "4.52", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6E42F017-98A7-4124-9D86-EA298F9EA25F", "versionEndIncluding": "4.61", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "43B1DC94-12A4-438E-8EF6-02CE3BDCD960", "versionEndIncluding": "4.61", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "F18B3BB2-60F6-4E24-869C-2A411C697668", "versionEndIncluding": "5.01", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "BA62B7FB-0C89-48F1-AC7C-1128702BD736", "versionEndIncluding": "5.01", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "D93C56CE-CFA2-40B4-9A35-7C413900EDB4", "versionEndIncluding": "5.5", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:workstations:*:*:*:*:*", "matchCriteriaId": "415DDB5B-7829-4971-BD1A-4C59FA930EC0", "versionEndIncluding": "5.43", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "315C0071-C761-4DC3-8640-E9334350C2B0", "versionEndIncluding": "5.51", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:client_security:*:*:*:*:*", "matchCriteriaId": "8D795DA7-D19B-4730-9995-E0953B858FAD", "versionEndIncluding": "5.55", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:firewalls:*:*:*:*:*", "matchCriteriaId": "30A6D6C5-BDFB-41A6-A941-27529CF2BDB7", "versionEndIncluding": "6.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "1B9E90E3-71D8-41B3-9E04-4DC115C16814", "versionEndIncluding": "6.31", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "095A03CE-6B8F-4275-87BE-44E807F97939", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7D56465-6411-449F-BF05-B303B0EF575E", "versionEndIncluding": "5.10", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AAB47F1-ACE9-417F-8FB4-480A5728D598", "versionEndIncluding": "6.41", "vulnerable": true}, {"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.06:*:linux:*:*:*:*:*", "matchCriteriaId": "33E76051-5D4A-4C8C-A911-3B78BFEA77CE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive."}], "id": "CVE-2005-0350", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2005-05-02T04:00:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.f-secure.com/security/fsc-2005-1.shtml"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://xforce.iss.net/xforce/alerts/id/188"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.f-secure.com/security/fsc-2005-1.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://xforce.iss.net/xforce/alerts/id/188"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}