Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2006-5938
Disclosure Date: November 16, 2006 (last updated October 04, 2023)
Grisoft AVG Anti-Virus before 7.1.407 has unknown impact and remote attack vectors involving an uninitialized variable and a crafted CAB file.
0
Attacker Value
Unknown
CVE-2006-5937
Disclosure Date: November 16, 2006 (last updated October 04, 2023)
Multiple integer overflows in Grisoft AVG Anti-Virus before 7.1.407 allow remote attackers to execute arbitrary code via crafted (1) CAB or (2) RAR archives that trigger a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2006-5939
Disclosure Date: November 16, 2006 (last updated October 04, 2023)
Grisoft AVG Anti-Virus before 7.1.407 allows remote attackers to cause a denial of service (crash) via a crafted DOC file that triggers a divide-by-zero error. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2006-5940
Disclosure Date: November 16, 2006 (last updated October 04, 2023)
Unspecified vulnerability in Grisoft AVG Anti-Virus before 7.1.407 has unknown impact and remote attack vectors related to "Integer Issues" and parsing of .EXE files.
0
Attacker Value
Unknown
CVE-2006-1125
Disclosure Date: March 09, 2006 (last updated February 22, 2025)
Grisoft AVG Free 7.1, and other versions including 7.0.308, sets Everyone/Full Control permissions for certain update files including (1) upd_vers.cfg, (2) incavi.avm, and (3) unspecified drivers, which might allow local users to gain privileges.
0
Attacker Value
Unknown
CVE-2005-3371
Disclosure Date: October 30, 2005 (last updated February 22, 2025)
Multiple interpretation error in AVG 7 7.0.323 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
0