This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Clamav First view 2005-11-05
Product Clamav Last view 2020-07-20
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:* 55
cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:* 54
cpe:2.3:a:clamav:clamav:0.86_rc1:*:*:*:*:*:*:* 54

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2020-07-20 CVE-2020-3481

A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.

7.5 2020-02-05 CVE-2020-3123

A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.

6.5 2020-01-15 CVE-2019-15961

A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.

7.5 2019-11-15 CVE-2013-7089

ClamAV before 0.97.7: dbg_printhex possible information leak

9.8 2019-11-15 CVE-2013-7088

ClamAV before 0.97.7 has buffer overflow in the libclamav component

9.8 2019-11-15 CVE-2013-7087

ClamAV before 0.97.7 has WWPack corrupt heap memory

9.8 2019-11-07 CVE-2007-6745

clamav 0.91.2 suffers from a floating point exception when using ScanOLE2.

9.8 2019-11-06 CVE-2007-0899

There is a possible heap overflow in libclamav/fsg.c before 0.100.0.

7.5 2019-11-05 CVE-2019-1789

ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.

7.5 2019-11-05 CVE-2019-12625

ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.

5.5 2019-04-08 CVE-2019-1798

A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.

5.5 2019-04-08 CVE-2019-1788

A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.

5.5 2019-04-08 CVE-2019-1787

A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.

5.5 2019-04-08 CVE-2019-1786

A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.

7.8 2019-04-08 CVE-2019-1785

A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.

5.5 2018-10-15 CVE-2018-15378

A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.

3.3 2018-07-16 CVE-2018-0361

ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.

5.5 2018-07-16 CVE-2018-0360

ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.

5.5 2018-03-27 CVE-2018-0202

clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.

5.5 2018-03-13 CVE-2018-1000085

ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.

7.5 2018-01-26 CVE-2017-12380

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.

9.8 2018-01-26 CVE-2017-12379

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.

5.5 2018-01-26 CVE-2017-12378

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.

9.8 2018-01-26 CVE-2017-12377

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.

7.8 2018-01-26 CVE-2017-12376

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.

CWE : Common Weakness Enumeration

%idName
20% (13) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
16% (11) CWE-125 Out-of-bounds Read
10% (7) CWE-399 Resource Management Errors
9% (6) CWE-189 Numeric Errors
7% (5) CWE-264 Permissions, Privileges, and Access Controls
7% (5) CWE-20 Improper Input Validation
3% (2) CWE-787 Out-of-bounds Write
3% (2) CWE-476 NULL Pointer Dereference
3% (2) CWE-416 Use After Free
3% (2) CWE-284 Access Control (Authorization) Issues
3% (2) CWE-17 Code
1% (1) CWE-404 Improper Resource Shutdown or Release
1% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (1) CWE-200 Information Exposure
1% (1) CWE-190 Integer Overflow or Wraparound
1% (1) CWE-134 Uncontrolled Format String
1% (1) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
1% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:13917 USN-754-1 -- clamav vulnerabilities
oval:org.mitre.oval:def:8256 DSA-1771 clamav -- several vulnerabilities
oval:org.mitre.oval:def:13611 DSA-1771-1 clamav -- several
oval:org.mitre.oval:def:13102 USN-926-1 -- clamav vulnerabilities
oval:org.mitre.oval:def:12559 USN-1031-1 -- clamav vulnerabilities
oval:org.mitre.oval:def:12961 USN-1076-1 -- clamav vulnerability
oval:org.mitre.oval:def:14130 USN-1179-1 -- clamav vulnerability
oval:org.mitre.oval:def:14449 USN-1258-1 -- ClamAV vulnerability
oval:org.mitre.oval:def:17990 USN-1482-3 -- clamav regression
oval:org.mitre.oval:def:17740 USN-1482-2 -- clamav regression
oval:org.mitre.oval:def:17465 USN-1482-1 -- clamav vulnerabilities
oval:org.mitre.oval:def:28352 SUSE-SU-2014:1571-1 -- Security update for clamav (important)
oval:org.mitre.oval:def:17560 USN-1816-1 -- clamav vulnerabilities
oval:org.mitre.oval:def:26004 SUSE-SU-2013:1059-2 -- Security update for clamav
oval:org.mitre.oval:def:25964 SUSE-SU-2013:1059-1 -- Security update for clamav
oval:org.mitre.oval:def:28489 USN-2423-1 -- ClamAV vulnerabilities
oval:org.mitre.oval:def:28679 SUSE-SU-2014:1574-1 -- Security update for clamav (important)

Open Source Vulnerability Database (OSVDB)

id Description
76785 ClamAV Multiple Function Recursion Level File Handling Remote DoS
74181 ClamAV clamd libclamav/matcher-hash.c cli_hm_scan() Function Crafted Message ...
70937 ClamAV vba_extract.c vba_read_project_strings() Function Double-free Arbitrar...
69656 ClamAV libclamav pdf.c PDF File Handling DoS (2010-4479)
69612 ClamAV libclamav pe_icons.c icon_cb() Function Off-by-one Memory Corruption
69611 ClamAV libclamav pdf.c PDF File Handling DoS (2010-4260)
68302 ClamAV pdf.c find_stream_bounds Function Crafted PDF File Handling Overflow
64940 ClamAV libclamav/pe_icons.c parseicon Function Crafted PE Icon Off-by-one DoS
64774 ClamAV libclamav/pdf.c cli_pdf() Function PDF File Handling DoS
63861 ClamAV Malformed CAB File Scanning Bypass
63818 ClamAV libclamav/mspack.c qtm_decompress Function Crafted CAB Archive DoS
53603 ClamAV libclamav/phishcheck.c cli_url_canon() Function URL Handling Overflow
53602 ClamAV Malformed UPack Packed File Handling DoS
53598 ClamAV --detect-broken Option PE File Handling DoS
53597 ClamAV RAR Archive Invalid Uncompressed Size Field Scan Bypass
53461 ClamAV libclamav/untar.c clamd / clamscan Infinite Loop DoS
51963 ClamAV LZH Archive Handling DoS
50772 ClamAV HTML Document MZ Header Multiple Filename Modification Malware Detecti...
42296 ClamAV libclamav libclamav/mew.c unmew11 Function Unspecified Heap Corruption
27809 Clam AntiVirus UPX libclamav/upx.c pefromupx Function rsize Value Overflow
24458 Clam AntiVirus Logging Code Format String
20484 Clam AntiVirus libclamav/mspack/cabd.c Infinite Loop DoS

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-13 Name : SuSE Update for ClamAV openSUSE-SU-2012:0833-1 (ClamAV)
File : nvt/gb_suse_2012_0833_1.nasl
2012-08-30 Name : Fedora Update for clamav FEDORA-2012-9563
File : nvt/gb_fedora_2012_9563_clamav_fc17.nasl
2012-08-17 Name : Ubuntu Update for clamav USN-1482-3
File : nvt/gb_ubuntu_USN_1482_3.nasl
2012-08-10 Name : FreeBSD Ports: clamav
File : nvt/freebsd_clamav17.nasl
2012-07-16 Name : Fedora Update for clamav FEDORA-2012-9577
File : nvt/gb_fedora_2012_9577_clamav_fc16.nasl
2012-06-22 Name : Ubuntu Update for clamav USN-1482-1
File : nvt/gb_ubuntu_USN_1482_1.nasl
2012-06-22 Name : Ubuntu Update for clamav USN-1482-2
File : nvt/gb_ubuntu_USN_1482_2.nasl
2012-04-02 Name : Fedora Update for clamav FEDORA-2011-15033
File : nvt/gb_fedora_2011_15033_clamav_fc16.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-20 (Clam AntiVirus)
File : nvt/glsa_201110_20.nasl
2011-11-22 Name : ClamAV Recursion Level Handling Denial of Service Vulnerability (Windows)
File : nvt/secpod_clamav_recursion_dos_vuln_win.nasl
2011-11-11 Name : Ubuntu Update for clamav USN-1258-1
File : nvt/gb_ubuntu_USN_1258_1.nasl
2011-11-11 Name : Fedora Update for clamav FEDORA-2011-15076
File : nvt/gb_fedora_2011_15076_clamav_fc14.nasl
2011-11-11 Name : Fedora Update for clamav FEDORA-2011-15119
File : nvt/gb_fedora_2011_15119_clamav_fc15.nasl
2011-08-29 Name : ClamAV Hash Manager Off-By-One Denial of Service Vulnerability (Win)
File : nvt/secpod_clamav_hash_manager_dos_vuln_win.nasl
2011-08-26 Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)
File : nvt/secpod_macosx_su11-001.nasl
2011-08-19 Name : Fedora Update for clamav FEDORA-2011-10053
File : nvt/gb_fedora_2011_10053_clamav_fc14.nasl
2011-08-19 Name : Fedora Update for clamav FEDORA-2011-10090
File : nvt/gb_fedora_2011_10090_clamav_fc15.nasl
2011-08-18 Name : Mandriva Update for clamav MDVSA-2011:122 (clamav)
File : nvt/gb_mandriva_MDVSA_2011_122.nasl
2011-08-02 Name : Ubuntu Update for clamav USN-1179-1
File : nvt/gb_ubuntu_USN_1179_1.nasl
2011-03-15 Name : Fedora Update for clamav FEDORA-2011-2743
File : nvt/gb_fedora_2011_2743_clamav_fc14.nasl
2011-03-15 Name : Fedora Update for clamav FEDORA-2011-2741
File : nvt/gb_fedora_2011_2741_clamav_fc13.nasl
2011-03-09 Name : Gentoo Security Advisory GLSA 201009-06 (clamav)
File : nvt/glsa_201009_06.nasl
2011-03-07 Name : Ubuntu Update for clamav vulnerability USN-1076-1
File : nvt/gb_ubuntu_USN_1076_1.nasl
2011-02-22 Name : ClamAV 'vba_read_project_strings()' Double Free Memory Corruption Vulnerability
File : nvt/gb_clamav_46470.nasl
2010-12-28 Name : Fedora Update for clamav FEDORA-2010-18564
File : nvt/gb_fedora_2010_18564_clamav_fc13.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2013-A-0179 Apple Mac OS X Security Update 2013-004
Severity: Category I - VMSKEY: V0040373

Snort® IPS/IDS

Date Description
2019-08-31 TAR multiple antivirus evasion attempt
RuleID : 50832 - Type : FILE-OTHER - Revision : 1
2017-10-10 RAR file malformed header antivirus evasion attempt
RuleID : 44323 - Type : FILE-OTHER - Revision : 2
2014-06-14 possible TAR file oversize length field
RuleID : 30995 - Type : INDICATOR-COMPROMISE - Revision : 2
2014-06-14 possible TAR file oversize length field
RuleID : 30994 - Type : INDICATOR-COMPROMISE - Revision : 2
2014-01-16 CHM LZX compression reset interval anti-virus evasion attempt
RuleID : 28979 - Type : FILE-OTHER - Revision : 3
2014-01-16 CHM LZX compression reset interval anti-virus evasion attempt
RuleID : 28978 - Type : FILE-OTHER - Revision : 3
2014-01-10 ClamAV UPX File Handling Heap overflow attempt
RuleID : 24238 - Type : FILE-EXECUTABLE - Revision : 5
2014-01-10 ClamAV UPX File Handling Heap overflow attempt
RuleID : 24237 - Type : FILE-EXECUTABLE - Revision : 5
2014-01-10 TAR multiple antivirus evasion attempt
RuleID : 23351 - Type : FILE-OTHER - Revision : 4
2014-01-10 ClamAV UPX FileHandling Heap overflow attempt
RuleID : 17493 - Type : FILE-OTHER - Revision : 13

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-14 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2019-1146.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-847fe2ed61.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-eff94da132.nasl - Type: ACT_GATHER_INFO
2018-10-25 Name: The remote Debian host is missing a security update.
File: debian_DLA-1553.nasl - Type: ACT_GATHER_INFO
2018-10-17 Name: The remote Fedora host is missing a security update.
File: fedora_2018-1fc39f2d13.nasl - Type: ACT_GATHER_INFO
2018-10-04 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_8b812395c73911e8ab5b9c5c8e75236a.nasl - Type: ACT_GATHER_INFO
2018-08-22 Name: The remote Debian host is missing a security update.
File: debian_DLA-1461.nasl - Type: ACT_GATHER_INFO
2018-08-03 Name: The antivirus service running on the remote host is affected by multiple vuln...
File: clamav_0_100_1.nasl - Type: ACT_GATHER_INFO
2018-07-10 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_d1e9d8c5839b11e896109c5c8e75236a.nasl - Type: ACT_GATHER_INFO
2018-04-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201804-16.nasl - Type: ACT_GATHER_INFO
2018-03-27 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-976.nasl - Type: ACT_GATHER_INFO
2018-03-19 Name: The remote Debian host is missing a security update.
File: debian_DLA-1307.nasl - Type: ACT_GATHER_INFO
2018-03-14 Name: The remote Fedora host is missing a security update.
File: fedora_2018-d2b08aa37f.nasl - Type: ACT_GATHER_INFO
2018-03-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-602b5345fa.nasl - Type: ACT_GATHER_INFO
2018-02-22 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-958.nasl - Type: ACT_GATHER_INFO
2018-02-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-958b22c73f.nasl - Type: ACT_GATHER_INFO
2018-02-06 Name: The antivirus service running on the remote host is affected by multiple deni...
File: clamav_0_99_3.nasl - Type: ACT_GATHER_INFO
2018-01-30 Name: The remote Fedora host is missing a security update.
File: fedora_2018-cb339851e7.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote Debian host is missing a security update.
File: debian_DLA-1261.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote Fedora host is missing a security update.
File: fedora_2018-a86bad9689.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_b464f61b84c74e1c8ad46cf9efffd025.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201801-19.nasl - Type: ACT_GATHER_INFO
2018-01-25 Name: The remote Fedora host is missing a security update.
File: fedora_2018-2a1f469c85.nasl - Type: ACT_GATHER_INFO
2017-09-25 Name: The remote Debian host is missing a security update.
File: debian_DLA-1105.nasl - Type: ACT_GATHER_INFO
2017-08-18 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3393-1.nasl - Type: ACT_GATHER_INFO