Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
clamav clamav 0.68 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-0133
ClamAV 0.80 and previous versions allows remote malicious users to cause a denial of service (clamd daemon crash) via a ZIP file with malformed headers.
Clam Anti-virus Clamav 0.53
Clam Anti-virus Clamav 0.54
Clam Anti-virus Clamav 0.60
Clam Anti-virus Clamav 0.65
Clam Anti-virus Clamav 0.52
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.68.1
Clam Anti-virus Clamav 0.51
Clam Anti-virus Clamav 0.68
Clam Anti-virus Clamav 0.80
5
CVSSv2
CVE-2005-0218
ClamAV 0.80 and previous versions allows remote malicious users to bypass virus scanning via a base64 encoded image in a data: (RFC 2397) URL.
Clam Anti-virus Clamav 0.51
Clam Anti-virus Clamav 0.53
Clam Anti-virus Clamav 0.68
Clam Anti-virus Clamav 0.80
Clam Anti-virus Clamav 0.54
Clam Anti-virus Clamav 0.60
Clam Anti-virus Clamav 0.65
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.52
Clam Anti-virus Clamav 0.68.1
2.6
CVSSv2
CVE-2004-1909
Claim Anti-Virus (ClamAV) 0.68 and previous versions allows remote malicious users to cause a denial of service (crash) via certain RAR archives, such as those generated by the Beagle/Bagle worm.
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.65
4.6
CVSSv2
CVE-2004-1876
The "%f" feature in the VirusEvent directive in Clam AntiVirus daemon (clamd) prior to 0.70 allows local users to execute arbitrary commands via shell metacharacters in a file name.
Clam Anti-virus Clamav 0.54
Clam Anti-virus Clamav 0.60
Clam Anti-virus Clamav 0.65
Clam Anti-virus Clamav 0.67
Clam Anti-virus Clamav 0.52
Clam Anti-virus Clamav 0.53
Clam Anti-virus Clamav 0.51
Clam Anti-virus Clamav 0.68
Clam Anti-virus Clamav 0.68.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4