CVE-2022-26122
https://notcve.org/view.php?id=CVE-2022-26122
An insufficient verification of data authenticity vulnerability [CWE-345] in FortiClient, FortiMail and FortiOS AV engines version 6.2.168 and below and version 6.4.274 and below may allow an attacker to bypass the AV engine via manipulating MIME attachment with junk and pad characters in base64. Una verificación insuficiente de la vulnerabilidad de autenticidad de datos [CWE-345] en los motores FortiClient, FortiMail y FortiOS AV versión 6.2.168 e inferiores y la versión 6.4.274 e inferiores puede permitir a un atacante eludir el motor AV mediante la manipulación del archivo adjunto MIME con basura y pad. caracteres en base64. • https://fortiguard.com/psirt/FG-IR-22-074 • CWE-345: Insufficient Verification of Data Authenticity •
CVE-2019-9698
https://notcve.org/view.php?id=CVE-2019-9698
Symantec AV Engine, prior to 13.0.9r17, may be susceptible to an arbitrary file deletion issue, which is a type of vulnerability that could allow an attacker to delete files on the resident system without elevated privileges. El motor AV de Symantec, versiones anteriores a 13.0.9r17, puede ser susceptible a un problema de eliminación arbitraria de archivos, que es un tipo de vulnerabilidad que podría permitir a un atacante eliminar archivos en el sistema residente sin privilegios elevados. • https://support.symantec.com/en_US/article.SYMSA1481.html •
CVE-2019-8285
https://notcve.org/view.php?id=CVE-2019-8285
Kaspersky Lab Antivirus Engine version before 04.apr.2019 has a heap-based buffer overflow vulnerability that potentially allow arbitrary code execution La versión de Kaspersky Lab Antivirus Engine anterior al 04.apr.2019 tiene una vulnerabilidad de desbordamiento de búfer basado en memoria dinámica (heap) que podría permitir la ejecución arbitraria de código. • http://www.securityfocus.com/bid/108284 https://support.kaspersky.com/vulnerability.aspx?el=12430#080519 • CWE-787: Out-of-bounds Write •
CVE-2005-0644
https://notcve.org/view.php?id=CVE-2005-0644
Buffer overflow in McAfee Scan Engine 4320 with DAT version before 4436 allows remote attackers to execute arbitrary code via a malformed LHA file with a type 2 header file name field, a variant of CVE-2005-0643. • http://images.mcafee.com/misc/McAfee_Security_Bulletin_05-march-17.pdf http://secunia.com/advisories/14628 http://securitytracker.com/id?1013463 http://www.kb.cert.org/vuls/id/361180 http://www.securityfocus.com/bid/10243 http://www.securityfocus.com/bid/12832 http://xforce.iss.net/xforce/alerts/id/190 •
CVE-2005-0643 – LHA 1.x - Remote Buffer Overflow / Directory Traversal
https://notcve.org/view.php?id=CVE-2005-0643
Buffer overflow in McAfee Scan Engine 4320 with DAT version before 4357 allows remote attackers to execute arbitrary code via crafted LHA files. • https://www.exploit-db.com/exploits/24067 http://images.mcafee.com/misc/McAfee_Security_Bulletin_05-march-17.pdf http://secunia.com/advisories/14628 http://www.securityfocus.com/bid/10243 •