Page 15 of 145 results (0.005 seconds)

CVSS: 9.1EPSS: 4%CPEs: 10EXPL: 0

06 Feb 2005 — ClamAV 0.80 and earlier allows remote attackers to bypass virus scanning via a base64 encoded image in a data: (RFC 2397) URL. • http://seclists.org/lists/fulldisclosure/2005/Jan/0332.html •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2004 — Claim Anti-Virus (ClamAV) 0.68 and earlier allows remote attackers to cause a denial of service (crash) via certain RAR archives, such as those generated by the Beagle/Bagle worm. • http://freshmeat.net/projects/clamav/?branch_id=29355&release_id=154462 •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 2

01 Sep 2004 — libclamav in Clam AntiVirus 0.65 allows remote attackers to cause a denial of service (crash) via a uuencoded e-mail message with an invalid line length (e.g., a lowercase character), which causes an assert error in clamd that terminates the calling program. libclamav de Clam AntiVirus 0.65 permite a atacantes remotos causar una denegación de servicio (caída) mediante un mensaje de correo electrónico con codificación uu con una longitud de línea inválida (por ejemplo, un carácter en minúsculas), lo que caus... • https://www.exploit-db.com/exploits/23667 •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 1

30 Mar 2004 — The "%f" feature in the VirusEvent directive in Clam AntiVirus daemon (clamd) before 0.70 allows local users to execute arbitrary commands via shell metacharacters in a file name. • http://marc.info/?l=bugtraq&m=108066864608615&w=2 •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

18 Nov 2003 — Format string vulnerability in clamav-milter for Clam AntiVirus 0.60 through 0.60p, and other versions before 0.65, allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in the email address argument of a "MAIL FROM" command. Vulenrabilidad de formateo de cadenas en clamav-milter para Clam AntiVirus 0.60 hasta la .60p y otras versiones anteriores a la 0.65 permite que atacantes remotos provoquen una denegación de servicio y posiblmente ejecuten... • http://marc.info/?l=bugtraq&m=106867135830683&w=2 •