Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
inoculateit vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-2092
eTrust InoculateIT for Linux 6.0 uses insecure permissions for multiple files and directories, including the application's registry and tmp directories, which allows local users to delete, modify, or examine sensitive information.
Broadcom Inoculateit 6.0
NA
CVE-2004-0267
The (1) inoregupdate, (2) uniftest, or (3) unimove scripts in eTrust InoculateIT for Linux 6.0 allow local users to overwrite arbitrary files via a symlink attack on files in /tmp.
Broadcom Inoculateit 6.0
NA
CVE-2001-0625
ftpdownload in Computer Associates InoculateIT 6.0 allows a local malicious user to overwrite arbitrary files via a symlink attack on /tmp/ftpdownload.log .
Broadcom Inoculateit 6.0
NA
CVE-2002-2285
eTrust InoculateIT 6.0 with the "Incremental Scan" option enabled may certify that a file is free of viruses before the file has been completely downloaded, which allows remote malicious users to bypass virus detection.
Broadcom Inoculateit 6.0
NA
CVE-1999-1368
AV Option for MS Exchange Server option for InoculateIT 4.53, and possibly other versions, only scans the Inbox folder tree of a Microsoft Exchange server, which could allow viruses to escape detection if a user's rules cause the message to be moved to a different mailbox.
Broadcom Inoculateit 4.53
NA
CVE-2000-1244
Computer Associates InoculateIT Agent for Exchange Server does not recognize an e-mail virus attachment if the SMTP header is missing the "From" field, which allows remote malicious users to bypass virus protection.
Broadcom Inoculateit Agent For Exchange
1 EDB exploit
NA
CVE-2005-1693
Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 up to and including 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB)...
Broadcom Etrust Antivirus 7.1
Ca Etrust Antivirus 7.1
Broadcom Etrust Ez Armor 2.4.4
Broadcom Etrust Ez Armor Le 2.0
Ca Etrust Secure Content Manager 1.0
Broadcom Etrust Secure Content Manager 1.1
Broadcom Etrust Antivirus 6.0
Broadcom Etrust Antivirus 7.0
Broadcom Etrust Ez Armor 1.0
Broadcom Etrust Ez Armor 2.0
Broadcom Etrust Intrusion Detection 1.4.5
Broadcom Etrust Intrusion Detection 1.5
Broadcom Etrust Intrusion Detection 3.0
Zonelabs Zonealarm
Zonelabs Zonealarm Antivirus
Ca Brightstor Arcserve Backup 11.1
Broadcom Etrust Antivirus Ee 6.0
Broadcom Etrust Antivirus Ee 7.0
Broadcom Etrust Ez Armor Le 3.0.0.14
Broadcom Etrust Intrusion Detection 1.4.1.13
Broadcom Inoculateit 6.0
Ca Vet Antivirus 10.66
NA
CVE-2004-0933
Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 up to and including 2.4, and EZ-Antivirus 6.1 up to and including 6.3 allow remote...
Archive Zip Archive Zip 1.13
Broadcom Etrust Ez Antivirus 6.2
Broadcom Etrust Ez Antivirus 6.3
Broadcom Etrust Secure Content Manager 1.0
Ca Etrust Secure Content Manager 1.0
Kaspersky Lab Kaspersky Anti-virus 4.0
Kaspersky Lab Kaspersky Anti-virus 5.0
Mcafee Antivirus Engine 4.3.20
Sophos Sophos Anti-virus 3.79
Sophos Sophos Anti-virus 3.80
Sophos Sophos Puremessage Anti-virus 4.6
Sophos Sophos Small Business Suite 1.0
Broadcom Etrust Antivirus Gateway 7.1
Broadcom Etrust Ez Antivirus 6.1
Broadcom Etrust Intrusion Detection 1.4.5
Broadcom Etrust Intrusion Detection 1.5
Eset Software Nod32 Antivirus 1.0.13
Kaspersky Lab Kaspersky Anti-virus 3.0
Sophos Sophos Anti-virus 3.78
Sophos Sophos Anti-virus 3.78d
Sophos Sophos Anti-virus 3.85
Sophos Sophos Anti-virus 3.86
1 EDB exploit
NA
CVE-2004-0934
Kaspersky 3.x to 4.x allows remote malicious users to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
Archive Zip Archive Zip 1.13
Broadcom Brightstor Arcserve Backup 11.1
Broadcom Etrust Ez Antivirus 6.2
Broadcom Etrust Ez Antivirus 6.3
Broadcom Etrust Secure Content Manager 1.0
Ca Etrust Secure Content Manager 1.0
Broadcom Etrust Antivirus Gateway 7.1
Broadcom Etrust Ez Antivirus 6.1
Broadcom Etrust Intrusion Detection 1.4.5
Broadcom Etrust Intrusion Detection 1.5
Kaspersky Lab Kaspersky Anti-virus 3.0
Kaspersky Lab Kaspersky Anti-virus 4.0
Sophos Sophos Anti-virus 3.78
Sophos Sophos Anti-virus 3.78d
Sophos Sophos Anti-virus 3.85
Sophos Sophos Anti-virus 3.86
Broadcom Etrust Antivirus 7.0
Ca Etrust Antivirus 7.0 Sp2
Broadcom Etrust Ez Armor 2.0
Broadcom Etrust Ez Armor 2.3
Broadcom Etrust Secure Content Manager 1.1
Broadcom Inoculateit 6.0
1 EDB exploit
NA
CVE-2004-0935
Eset Anti-Virus prior to 1.020 (16th September 2004) allows remote malicious users to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
Broadcom Etrust Antivirus Gateway 7.1
Broadcom Etrust Ez Antivirus 6.1
Broadcom Etrust Intrusion Detection 1.4.5
Broadcom Etrust Intrusion Detection 1.5
Kaspersky Lab Kaspersky Anti-virus 3.0
Kaspersky Lab Kaspersky Anti-virus 4.0
Sophos Sophos Anti-virus 3.78
Sophos Sophos Anti-virus 3.78d
Sophos Sophos Anti-virus 3.85
Sophos Sophos Anti-virus 3.86
Broadcom Etrust Antivirus 7.0
Ca Etrust Antivirus 7.0 Sp2
Broadcom Etrust Ez Armor 2.0
Broadcom Etrust Ez Armor 2.3
Broadcom Etrust Secure Content Manager 1.1
Broadcom Inoculateit 6.0
Eset Software Nod32 Antivirus 1.0.11
Rav Antivirus Rav Antivirus Desktop 8.6
Rav Antivirus Rav Antivirus For File Servers 1.0
Sophos Sophos Anti-virus 3.81
Sophos Sophos Anti-virus 3.82
Archive Zip Archive Zip 1.13
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »