Software catalogue for F-Secure

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › F-Secure

Software catalogue for F-Secure

F-Secure Anti-Virus F-Secure Endpoint Proxy F-Secure Internet Gatekeeper F-Secure Internet Security F-Secure Messaging Security Gateway F-Secure Personal Express F-Secure Policy Manager
F-Secure Policy Manager for Linux F-Secure Policy Manager Proxy F-Secure Policy Manager Proxy for Linux F-Secure Safe Browser F‑Secure Total


Latest security bulletins

Secuity bulletin Severity Status Published
SB2024080591: Privilege escalation in F-Secure Total Low
Not patched
05.08.2024
SB2021122125: Remote code execution in F-Secure Endpoint Proxy (Apache Log4j component) Critical
Patched Exploited
21.12.2021
SB2021122124: Remote code execution in F-Secure Policy Manager Proxy for Linux (Apache Log4j component) Critical
Patched Exploited
21.12.2021
SB2021122123: Remote code execution in F-Secure Policy Manager Proxy (Apache Log4j component) Critical
Patched Exploited
21.12.2021
SB2021122122: Remote code execution in F-Secure Policy Manager for Linux (Apache Log4j component) Critical
Patched Exploited
21.12.2021
SB2021122121: Remote code execution in F-Secure Policy Manager (Apache Log4j component) Critical
Patched Exploited
21.12.2021
SB2021092906: Multiple vulnerabilities in F-Secure Internet Gatekeeper High
Patched
29.09.2021
SB2021081317: Multiple vulnerabilities in F-Secure SAFE Browser Medium
Patched
13.08.2021

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or