Page 7 of 70 results (0.009 seconds)

CVSS: 7.5EPSS: 30%CPEs: 48EXPL: 2

19 Nov 2004 — Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 •

CVSS: 7.5EPSS: 14%CPEs: 48EXPL: 2

19 Nov 2004 — Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 •

CVSS: 7.5EPSS: 13%CPEs: 48EXPL: 2

19 Nov 2004 — Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 •

CVSS: 7.5EPSS: 13%CPEs: 48EXPL: 2

19 Nov 2004 — RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 •

CVSS: 7.7EPSS: 13%CPEs: 48EXPL: 2

19 Nov 2004 — Sophos Anti-Virus before 3.87.0, and Sophos Anti-Virus for Windows 95, 98, and Me before 3.88.0, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

15 Sep 2001 — Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 creates a hidden share named ARCSERVE$, which allows remote attackers to obtain sensitive information and overwrite critical files. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

15 Sep 2001 — Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 2

18 May 2001 — Computer Associates ARCserveIT 6.61 and 6.63 (also called ARCservIT) allows local users to overwrite arbitrary files via a symlink attack on the temporary files (1) asagent.tmp or (2) inetd.tmp. • https://www.exploit-db.com/exploits/20867 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

21 Feb 1999 — ARCserve NT agents use weak encryption (XOR) for passwords, which allows remote attackers to sniff the authentication request to port 6050 and decrypt the password. • http://marc.info/?l=bugtraq&m=91972006211238&w=2 •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

12 Nov 1998 — The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext. • http://marc.info/?l=ntbugtraq&m=91096758513985&w=2 •