CVE-2004-0936 – Multiple AntiVirus - '.zip' Detection Bypass
https://notcve.org/view.php?id=CVE-2004-0936
RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/968818 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •
CVE-2004-0932 – Multiple AntiVirus - '.zip' Detection Bypass
https://notcve.org/view.php?id=CVE-2004-0932
McAfee Anti-Virus Engine DATS drivers before 4398 released on Oct 13th 2004 and DATS Driver before 4397 October 6th 2004 allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •
CVE-2004-0934 – Multiple AntiVirus - '.zip' Detection Bypass
https://notcve.org/view.php?id=CVE-2004-0934
Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/968818 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •
CVE-2004-0267
https://notcve.org/view.php?id=CVE-2004-0267
The (1) inoregupdate, (2) uniftest, or (3) unimove scripts in eTrust InoculateIT for Linux 6.0 allow local users to overwrite arbitrary files via a symlink attack on files in /tmp. Los scripts (1) inorgupdate, (2) uniftest, o (3) unimove de eTrust InoculateIT 6.0 para Linux permiten a usuarios locales sobreescribir ficheros de su elección mediante un ataque de enlaces simbólicos en /tmp. • http://marc.info/?l=bugtraq&m=107635584431518&w=2 http://secunia.com/advisories/10833 http://www.excluded.org/advisories/advisory10.txt http://www.osvdb.org/4735 http://www.osvdb.org/4855 http://www.osvdb.org/4856 http://www.securityfocus.com/bid/9616 https://exchange.xforce.ibmcloud.com/vulnerabilities/15102 •
CVE-2004-2092
https://notcve.org/view.php?id=CVE-2004-2092
eTrust InoculateIT for Linux 6.0 uses insecure permissions for multiple files and directories, including the application's registry and tmp directories, which allows local users to delete, modify, or examine sensitive information. • http://marc.info/?l=bugtraq&m=107635584431518&w=2 http://secunia.com/advisories/10833 http://www.excluded.org/advisories/advisory10.txt http://www.osvdb.org/3896 http://www.securityfocus.com/bid/9616 https://exchange.xforce.ibmcloud.com/vulnerabilities/15103 •