3 results (0.001 seconds)

CVSS: 7.8EPSS: 2%CPEs: 9EXPL: 1

Panda Software Antivirus before 20070402 allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. Panda Software Antivirus versiones anteriores a 20070402 permite a atacantes remotos provocar una denegación de servicio (bucle infinito) mediante un archivo ZOO con una estructura de entradas de directorio que apuntan a un fichero previo. • http://osvdb.org/35845 http://secunia.com/advisories/25152 http://www.securityfocus.com/archive/1/467646/100/0/threaded http://www.securityfocus.com/bid/23823 http://www.vupen.com/english/advisories/2007/1700 https://exchange.xforce.ibmcloud.com/vulnerabilities/34080 •

CVSS: 7.5EPSS: 25%CPEs: 20EXPL: 0

Heap-based buffer overflow in pskcmp.dll in Panda Software Antivirus library allows remote attackers to execute arbitrary code via a crafted ZOO archive. • http://secunia.com/advisories/17765 http://securityreason.com/securityalert/216 http://securitytracker.com/id?1015295 http://www.osvdb.org/21256 http://www.rem0te.com/public/images/panda.pdf http://www.securityfocus.com/archive/1/418096/100/0/threaded http://www.securityfocus.com/bid/15616 http://www.vupen.com/english/advisories/2005/2666 https://exchange.xforce.ibmcloud.com/vulnerabilities/23276 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Multiple interpretation error in Panda Titanium 2005 4.02.01 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." • http://marc.info/?l=bugtraq&m=113026417802703&w=2 http://www.securityelf.org/magicbyte.html http://www.securityelf.org/magicbyteadv.html http://www.securityelf.org/updmagic.html http://www.securityfocus.com/bid/15189 •