Show filters
104 Total Results
Displaying 91-100 of 104
Sort by:
Attacker Value
Unknown
CVE-2007-1673
Disclosure Date: May 09, 2007 (last updated October 04, 2023)
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
0
Attacker Value
Unknown
CVE-2006-6627
Disclosure Date: December 18, 2006 (last updated October 04, 2023)
Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability."
0
Attacker Value
Unknown
CVE-2006-6407
Disclosure Date: December 10, 2006 (last updated October 04, 2023)
F-Prot Antivirus for Linux x86 Mail Servers 4.6.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file.
0
Attacker Value
Unknown
CVE-2006-6352
Disclosure Date: December 07, 2006 (last updated October 04, 2023)
FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to cause a denial of service (infinite loop) via a crafted ACE file. NOTE: this issue has at least a partial overlap with CVE-2006-6294.
0
Attacker Value
Unknown
CVE-2006-6294
Disclosure Date: December 05, 2006 (last updated October 04, 2023)
Multiple unspecified vulnerabilities in FRISK Software F-Prot Antivirus before 4.6.7 have unspecified impact and attack vectors. NOTE: this might be related to CVE-2006-6293, but it is not clear due to the vagueness of the report.
0
Attacker Value
Unknown
CVE-2006-6293
Disclosure Date: December 05, 2006 (last updated October 04, 2023)
Heap-based buffer overflow in FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to execute arbitrary code via a crafted CHM file. NOTE: this issue has at least a partial overlap with CVE-2006-6294.
0
Attacker Value
Unknown
CVE-2006-4855
Disclosure Date: September 19, 2006 (last updated October 04, 2023)
The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data.
0
Attacker Value
Unknown
CVE-2005-3499
Disclosure Date: November 04, 2005 (last updated February 22, 2025)
Frisk F-Prot Antivirus allows remote attackers to bypass protection via a ZIP file with a version header greater than 15, which prevents F-Prot from decompressing and analyzing the file.
0
Attacker Value
Unknown
CVE-2005-3374
Disclosure Date: October 30, 2005 (last updated February 22, 2025)
Multiple interpretation error in F-Prot 3.16c allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
0
Attacker Value
Unknown
CVE-2005-3213
Disclosure Date: October 14, 2005 (last updated February 22, 2025)
Multiple interpretation error in unspecified versions of F-Prot Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
0