Show filters
194 Total Results
Displaying 161-170 of 194
Sort by:
Attacker Value
Unknown

CVE-2005-3546

Disclosure Date: November 16, 2005 (last updated February 22, 2025)
suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege.
0
Attacker Value
Unknown

CVE-2005-3468

Disclosure Date: November 02, 2005 (last updated February 22, 2025)
Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files.
0
Attacker Value
Unknown

CVE-2005-3382

Disclosure Date: October 30, 2005 (last updated February 22, 2025)
Multiple interpretation error in Sophos 3.91 with the 2.28.4 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
0
Attacker Value
Unknown

CVE-2005-3376

Disclosure Date: October 30, 2005 (last updated February 22, 2025)
Multiple interpretation error in Kaspersky 5.0.372 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
0
Attacker Value
Unknown

CVE-2005-3216

Disclosure Date: October 14, 2005 (last updated February 22, 2025)
Multiple interpretation error in unspecified versions of Sophos Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
0
Attacker Value
Unknown

CVE-2005-3210

Disclosure Date: October 14, 2005 (last updated February 22, 2025)
Multiple interpretation error in unspecified versions of Kaspersky Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
0
Attacker Value
Unknown

CVE-2005-3142

Disclosure Date: October 05, 2005 (last updated February 22, 2025)
Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header.
0
Attacker Value
Unknown

CVE-2005-2768

Disclosure Date: September 02, 2005 (last updated February 22, 2025)
Heap-based buffer overflow in the Sophos Antivirus Library, as used by Sophos Antivirus, PureMessage, MailMonitor, and other products, allows remote attackers to execute arbitrary code via a Visio file with a crafted sub record length.
0
Attacker Value
Unknown

CVE-2005-2582

Disclosure Date: August 16, 2005 (last updated February 22, 2025)
Kaspersky Anti-Virus for Unix/Linux File Servers 5.0-5 uses world-writable permissions for the (1) log and (2) license directory, which allows local users to delete log files, append to arbitrary files via a symlink attack on kavmonitor.log, or delete license keys and prevent keepup2date from properly executing.
0
Attacker Value
Unknown

CVE-2005-1530

Disclosure Date: July 19, 2005 (last updated February 22, 2025)
Sophos Anti-Virus 5.0.1, with "Scan inside archive files" enabled, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a Bzip2 archive with a large 'Extra field length' value.
0