Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6w73-7qpj-v2vh

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR.

The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR.

EPSS

Процентиль: 80%
0.0141
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR.

nvd
больше 18 лет назад

The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR.

debian
больше 18 лет назад

The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 all ...

EPSS

Процентиль: 80%
0.0141
Низкий