Show filters
225 Total Results
Displaying 201-210 of 225
Sort by:
Attacker Value
Unknown
CVE-2004-0937
Disclosure Date: February 09, 2005 (last updated February 22, 2025)
Sophos Anti-Virus before 3.87.0, and Sophos Anti-Virus for Windows 95, 98, and Me before 3.88.0, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
0
Attacker Value
Unknown
CVE-2004-0934
Disclosure Date: January 27, 2005 (last updated February 22, 2025)
Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
0
Attacker Value
Unknown
CVE-2004-0933
Disclosure Date: January 27, 2005 (last updated February 22, 2025)
Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
0
Attacker Value
Unknown
CVE-2004-0936
Disclosure Date: January 27, 2005 (last updated February 22, 2025)
RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
0
Attacker Value
Unknown
CVE-2004-0932
Disclosure Date: January 27, 2005 (last updated February 22, 2025)
McAfee Anti-Virus Engine DATS drivers before 4398 released on Oct 13th 2004 and DATS Driver before 4397 October 6th 2004 allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
0
Attacker Value
Unknown
CVE-2004-0935
Disclosure Date: January 27, 2005 (last updated February 22, 2025)
Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
0
Attacker Value
Unknown
CVE-2004-1096
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
0
Attacker Value
Unknown
CVE-2004-2629
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Multiple vulnerabilities in the H.323 protocol implementation for First Virtual Communications Click to Meet Express (when used with H.323 conferencing endpoints), Click to Meet Premier, Conference Server, and V-Gate allow remote attackers to cause a denial of service, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
0
Attacker Value
Unknown
CVE-2004-2533
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Serv-U FTP Server 4.1 (possibly 4.0) allows remote attackers to cause a denial of service (application crash) via a SITE CHMOD command with a "\\...\" followed by a short string, causing partial memory corruption, a different vulnerability than CVE-2004-2111.
0
Attacker Value
Unknown
CVE-2004-2532
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Serv-U FTP server before 5.1.0.0 has a default account and password for local administration, which allows local users to execute arbitrary commands by connecting to the server using the default administrator account, creating a new user, logging in as that new user, and then using the SITE EXEC command.
0