Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
clamav clamav 0.67 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-0133
ClamAV 0.80 and previous versions allows remote malicious users to cause a denial of service (clamd daemon crash) via a ZIP file with malformed headers.
Clam Anti-virus Clamav 0.53
Clam Anti-virus Clamav 0.54
Clam Anti-virus Clamav 0.60
Clam Anti-virus Clamav 0.65
Clam Anti-virus Clamav 0.52
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.68.1
Clam Anti-virus Clamav 0.51
Clam Anti-virus Clamav 0.68
Clam Anti-virus Clamav 0.80
5
CVSSv2
CVE-2005-0218
ClamAV 0.80 and previous versions allows remote malicious users to bypass virus scanning via a base64 encoded image in a data: (RFC 2397) URL.
Clam Anti-virus Clamav 0.51
Clam Anti-virus Clamav 0.53
Clam Anti-virus Clamav 0.68
Clam Anti-virus Clamav 0.80
Clam Anti-virus Clamav 0.54
Clam Anti-virus Clamav 0.60
Clam Anti-virus Clamav 0.65
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.52
Clam Anti-virus Clamav 0.68.1
2.6
CVSSv2
CVE-2004-1909
Claim Anti-Virus (ClamAV) 0.68 and previous versions allows remote malicious users to cause a denial of service (crash) via certain RAR archives, such as those generated by the Beagle/Bagle worm.
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.65
4.6
CVSSv2
CVE-2004-1876
The "%f" feature in the VirusEvent directive in Clam AntiVirus daemon (clamd) prior to 0.70 allows local users to execute arbitrary commands via shell metacharacters in a file name.
Clam Anti-virus Clamav 0.54
Clam Anti-virus Clamav 0.60
Clam Anti-virus Clamav 0.65
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.52
Clam Anti-virus Clamav 0.53
Clam Anti-virus Clamav 0.51
Clam Anti-virus Clamav 0.68
Clam Anti-virus Clamav 0.68.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4