Page 21 of 107 results (0.146 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The filecopy function in misc.c in Clam AntiVirus (ClamAV) before 0.85, on Mac OS, allows remote attackers to execute arbitrary code via a virus in a filename that contains shell metacharacters, which are not properly handled when HFS permissions prevent the file from being deleted and ditto is invoked. La función filecopy en misc.c en Clam AntiVirus (ClamAV) en versiones anteriores a 0.85, en Mac OS, permite a atacantes remotos ejecutar código arbitrario a través de un virus en un nombre de archivo que contiene metacaractéres shell, que no son manejados adecuadamente cuando permisos HFS impiden que el archivo sea borrado y el mismo se invoca. • http://securitytracker.com/id?1014070 http://www.sentinelchicken.com/advisories/clamav • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 6%CPEs: 10EXPL: 0

ClamAV 0.80 and earlier allows remote attackers to bypass virus scanning via a base64 encoded image in a data: (RFC 2397) URL. • http://seclists.org/lists/fulldisclosure/2005/Jan/0332.html http://seclists.org/lists/fulldisclosure/2005/Jan/0537.html http://secunia.com/advisories/13900 http://sourceforge.net/project/shownotes.php?release_id=300116 http://www.gentoo.org/security/en/glsa/glsa-200501-46.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:025 •

CVSS: 5.0EPSS: 1%CPEs: 10EXPL: 0

ClamAV 0.80 and earlier allows remote attackers to cause a denial of service (clamd daemon crash) via a ZIP file with malformed headers. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000928 http://sourceforge.net/project/shownotes.php?release_id=300116 http://www.gentoo.org/security/en/glsa/glsa-200501-46.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:025 http://www.trustix.org/errata/2005/0003 •

CVSS: 2.6EPSS: 1%CPEs: 2EXPL: 0

Claim Anti-Virus (ClamAV) 0.68 and earlier allows remote attackers to cause a denial of service (crash) via certain RAR archives, such as those generated by the Beagle/Bagle worm. • http://freshmeat.net/projects/clamav/?branch_id=29355&release_id=154462 http://secunia.com/advisories/11177 http://security.gentoo.org/glsa/glsa-200404-07.xml http://www.securityfocus.com/bid/9897 https://exchange.xforce.ibmcloud.com/vulnerabilities/15553 •

CVSS: 5.0EPSS: 6%CPEs: 1EXPL: 2

libclamav in Clam AntiVirus 0.65 allows remote attackers to cause a denial of service (crash) via a uuencoded e-mail message with an invalid line length (e.g., a lowercase character), which causes an assert error in clamd that terminates the calling program. libclamav de Clam AntiVirus 0.65 permite a atacantes remotos causar una denegación de servicio (caída) mediante un mensaje de correo electrónico con codificación uu con una longitud de línea inválida (por ejemplo, un carácter en minúsculas), lo que causa un error de asercíón en clamd que termina al programa llamante. • https://www.exploit-db.com/exploits/23667 http://marc.info/?l=bugtraq&m=107634700823822&w=2 http://security.gentoo.org/glsa/glsa-200402-07.xml http://www.freebsd.org/cgi/query-pr.cgi?pr=62586 http://www.osvdb.org/3894 http://www.securityfocus.com/bid/9610 https://exchange.xforce.ibmcloud.com/vulnerabilities/15077 •