Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/clamav@0.99%2Bdfsg-0%2Bdeb7u2
Typedeb
Namespacedebian
Nameclamav
Version0.99+dfsg-0+deb7u2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.4.4+dfsg-1
Latest_non_vulnerable_version1.4.4+dfsg-1
Affected_by_vulnerabilities
0
url VCID-1346-uavy-pbdb
vulnerability_id VCID-1346-uavy-pbdb
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1787
reference_id
reference_type
scores
0
value 0.05473
scoring_system epss
scoring_elements 0.90157
published_at 2026-04-01T12:55:00Z
1
value 0.05473
scoring_system epss
scoring_elements 0.9016
published_at 2026-04-02T12:55:00Z
2
value 0.05473
scoring_system epss
scoring_elements 0.90172
published_at 2026-04-04T12:55:00Z
3
value 0.05473
scoring_system epss
scoring_elements 0.90177
published_at 2026-04-07T12:55:00Z
4
value 0.05473
scoring_system epss
scoring_elements 0.90193
published_at 2026-04-08T12:55:00Z
5
value 0.05473
scoring_system epss
scoring_elements 0.90198
published_at 2026-04-09T12:55:00Z
6
value 0.05473
scoring_system epss
scoring_elements 0.90207
published_at 2026-04-11T12:55:00Z
7
value 0.05473
scoring_system epss
scoring_elements 0.90206
published_at 2026-04-12T12:55:00Z
8
value 0.05473
scoring_system epss
scoring_elements 0.90201
published_at 2026-04-13T12:55:00Z
9
value 0.05473
scoring_system epss
scoring_elements 0.90219
published_at 2026-04-18T12:55:00Z
10
value 0.05473
scoring_system epss
scoring_elements 0.90216
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1787
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12181
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:55Z/
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12181
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00019.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:55Z/
url https://lists.debian.org/debian-lts-announce/2019/04/msg00019.html
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-1787
reference_id CVE-2019-1787
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-1787
12
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:55Z/
url https://security.gentoo.org/glsa/201904-12
13
reference_url https://usn.ubuntu.com/3940-1/
reference_id USN-3940-1
reference_type
scores
url https://usn.ubuntu.com/3940-1/
14
reference_url https://usn.ubuntu.com/3940-2/
reference_id USN-3940-2
reference_type
scores
url https://usn.ubuntu.com/3940-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-1787
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1346-uavy-pbdb
1
url VCID-2aju-u36p-gug9
vulnerability_id VCID-2aju-u36p-gug9
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20796
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09409
published_at 2026-04-07T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09483
published_at 2026-04-08T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09497
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09448
published_at 2026-04-02T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09544
published_at 2026-04-21T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09394
published_at 2026-04-18T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09393
published_at 2026-04-16T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09498
published_at 2026-04-13T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09516
published_at 2026-04-12T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09545
published_at 2026-04-11T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.0953
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20796
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20796
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
reference_id 7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T15:58:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
4
reference_url https://security.archlinux.org/AVG-2722
reference_id AVG-2722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2722
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
reference_id BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T15:58:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
6
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-vL9x58p4
reference_id cisco-sa-clamav-dos-vL9x58p4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T15:58:27Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-vL9x58p4
7
reference_url https://security.gentoo.org/glsa/202310-01
reference_id GLSA-202310-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T15:58:27Z/
url https://security.gentoo.org/glsa/202310-01
8
reference_url https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T15:58:27Z/
url https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
reference_id N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T15:58:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
10
reference_url https://usn.ubuntu.com/5423-1/
reference_id USN-5423-1
reference_type
scores
url https://usn.ubuntu.com/5423-1/
11
reference_url https://usn.ubuntu.com/5423-2/
reference_id USN-5423-2
reference_type
scores
url https://usn.ubuntu.com/5423-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
1
vulnerability VCID-63vt-1nc8-6kfc
2
vulnerability VCID-ggz7-h35v-p7ep
3
vulnerability VCID-vdhk-r67a-s3fr
4
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1
aliases CVE-2022-20796
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2aju-u36p-gug9
2
url VCID-32nc-x9aw-a3fb
vulnerability_id VCID-32nc-x9aw-a3fb
summary ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:22:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:22:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12625
reference_id
reference_type
scores
0
value 0.0214
scoring_system epss
scoring_elements 0.84237
published_at 2026-04-21T12:55:00Z
1
value 0.0214
scoring_system epss
scoring_elements 0.84153
published_at 2026-04-02T12:55:00Z
2
value 0.0214
scoring_system epss
scoring_elements 0.84214
published_at 2026-04-12T12:55:00Z
3
value 0.0214
scoring_system epss
scoring_elements 0.8421
published_at 2026-04-13T12:55:00Z
4
value 0.0214
scoring_system epss
scoring_elements 0.84232
published_at 2026-04-16T12:55:00Z
5
value 0.0214
scoring_system epss
scoring_elements 0.84233
published_at 2026-04-18T12:55:00Z
6
value 0.0214
scoring_system epss
scoring_elements 0.8414
published_at 2026-04-01T12:55:00Z
7
value 0.0214
scoring_system epss
scoring_elements 0.84171
published_at 2026-04-04T12:55:00Z
8
value 0.0214
scoring_system epss
scoring_elements 0.84173
published_at 2026-04-07T12:55:00Z
9
value 0.0214
scoring_system epss
scoring_elements 0.84195
published_at 2026-04-08T12:55:00Z
10
value 0.0214
scoring_system epss
scoring_elements 0.84201
published_at 2026-04-09T12:55:00Z
11
value 0.0214
scoring_system epss
scoring_elements 0.84219
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12625
3
reference_url https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:22:32Z/
url https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12625
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359
reference_id 934359
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-12625
reference_id CVE-2019-12625
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-12625
9
reference_url https://usn.ubuntu.com/4146-1/
reference_id USN-4146-1
reference_type
scores
url https://usn.ubuntu.com/4146-1/
10
reference_url https://usn.ubuntu.com/4146-2/
reference_id USN-4146-2
reference_type
scores
url https://usn.ubuntu.com/4146-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-12625
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32nc-x9aw-a3fb
3
url VCID-3uwh-y2m1-nugc
vulnerability_id VCID-3uwh-y2m1-nugc
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000085
reference_id
reference_type
scores
0
value 0.00699
scoring_system epss
scoring_elements 0.72009
published_at 2026-04-21T12:55:00Z
1
value 0.00699
scoring_system epss
scoring_elements 0.72024
published_at 2026-04-18T12:55:00Z
2
value 0.00699
scoring_system epss
scoring_elements 0.71929
published_at 2026-04-01T12:55:00Z
3
value 0.00699
scoring_system epss
scoring_elements 0.71936
published_at 2026-04-02T12:55:00Z
4
value 0.00699
scoring_system epss
scoring_elements 0.71956
published_at 2026-04-04T12:55:00Z
5
value 0.00699
scoring_system epss
scoring_elements 0.71933
published_at 2026-04-07T12:55:00Z
6
value 0.00699
scoring_system epss
scoring_elements 0.71972
published_at 2026-04-08T12:55:00Z
7
value 0.00699
scoring_system epss
scoring_elements 0.71984
published_at 2026-04-09T12:55:00Z
8
value 0.00699
scoring_system epss
scoring_elements 0.72008
published_at 2026-04-11T12:55:00Z
9
value 0.00699
scoring_system epss
scoring_elements 0.71991
published_at 2026-04-12T12:55:00Z
10
value 0.00699
scoring_system epss
scoring_elements 0.71976
published_at 2026-04-13T12:55:00Z
11
value 0.00699
scoring_system epss
scoring_elements 0.72017
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000085
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000085
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/ASA-201803-14
reference_id ASA-201803-14
reference_type
scores
url https://security.archlinux.org/ASA-201803-14
4
reference_url https://security.archlinux.org/AVG-602
reference_id AVG-602
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-602
5
reference_url https://security.gentoo.org/glsa/201804-16
reference_id GLSA-201804-16
reference_type
scores
url https://security.gentoo.org/glsa/201804-16
6
reference_url https://usn.ubuntu.com/3592-1/
reference_id USN-3592-1
reference_type
scores
url https://usn.ubuntu.com/3592-1/
7
reference_url https://usn.ubuntu.com/3592-2/
reference_id USN-3592-2
reference_type
scores
url https://usn.ubuntu.com/3592-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2018-1000085
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3uwh-y2m1-nugc
4
url VCID-4eva-e818-yfgq
vulnerability_id VCID-4eva-e818-yfgq
summary libclamav in ClamAV (aka Clam AntiVirus), as used in Advanced Malware Protection (AMP) on Cisco Email Security Appliance (ESA) devices before 9.7.0-125 and Web Security Appliance (WSA) devices before 9.0.1-135 and 9.1.x before 9.1.1-041, allows remote attackers to cause a denial of service (AMP process restart) via a crafted document, aka Bug IDs CSCuv78533 and CSCuw60503.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1405
reference_id
reference_type
scores
0
value 0.03819
scoring_system epss
scoring_elements 0.88131
published_at 2026-04-21T12:55:00Z
1
value 0.03819
scoring_system epss
scoring_elements 0.8812
published_at 2026-04-13T12:55:00Z
2
value 0.03819
scoring_system epss
scoring_elements 0.88133
published_at 2026-04-16T12:55:00Z
3
value 0.03819
scoring_system epss
scoring_elements 0.88061
published_at 2026-04-01T12:55:00Z
4
value 0.03819
scoring_system epss
scoring_elements 0.8807
published_at 2026-04-02T12:55:00Z
5
value 0.03819
scoring_system epss
scoring_elements 0.88086
published_at 2026-04-04T12:55:00Z
6
value 0.03819
scoring_system epss
scoring_elements 0.88091
published_at 2026-04-07T12:55:00Z
7
value 0.03819
scoring_system epss
scoring_elements 0.8811
published_at 2026-04-08T12:55:00Z
8
value 0.03819
scoring_system epss
scoring_elements 0.88116
published_at 2026-04-09T12:55:00Z
9
value 0.03819
scoring_system epss
scoring_elements 0.88126
published_at 2026-04-11T12:55:00Z
10
value 0.03819
scoring_system epss
scoring_elements 0.88119
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1405
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1405
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/vrtadmin/clamav-devel/blob/master/ChangeLog
reference_id
reference_type
scores
url https://github.com/vrtadmin/clamav-devel/blob/master/ChangeLog
4
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160531-wsa-esa
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160531-wsa-esa
5
reference_url http://www.securityfocus.com/bid/90968
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90968
6
reference_url http://www.securitytracker.com/id/1035993
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035993
7
reference_url http://www.securitytracker.com/id/1035994
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035994
8
reference_url http://www.ubuntu.com/usn/USN-3093-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3093-1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1405
reference_id CVE-2016-1405
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1405
15
reference_url https://usn.ubuntu.com/3093-1/
reference_id USN-3093-1
reference_type
scores
url https://usn.ubuntu.com/3093-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2016-1405
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4eva-e818-yfgq
5
url VCID-4z4r-2w8m-r7dz
vulnerability_id VCID-4z4r-2w8m-r7dz
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-20032
reference_id
reference_type
scores
0
value 0.07124
scoring_system epss
scoring_elements 0.91559
published_at 2026-04-21T12:55:00Z
1
value 0.07124
scoring_system epss
scoring_elements 0.91542
published_at 2026-04-13T12:55:00Z
2
value 0.07124
scoring_system epss
scoring_elements 0.91544
published_at 2026-04-12T12:55:00Z
3
value 0.07124
scoring_system epss
scoring_elements 0.91564
published_at 2026-04-16T12:55:00Z
4
value 0.07124
scoring_system epss
scoring_elements 0.9156
published_at 2026-04-18T12:55:00Z
5
value 0.07305
scoring_system epss
scoring_elements 0.91677
published_at 2026-04-09T12:55:00Z
6
value 0.07305
scoring_system epss
scoring_elements 0.91644
published_at 2026-04-02T12:55:00Z
7
value 0.07305
scoring_system epss
scoring_elements 0.9165
published_at 2026-04-04T12:55:00Z
8
value 0.07305
scoring_system epss
scoring_elements 0.91658
published_at 2026-04-07T12:55:00Z
9
value 0.07305
scoring_system epss
scoring_elements 0.9167
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-20032
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20032
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031509
reference_id 1031509
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031509
4
reference_url https://security.gentoo.org/glsa/202310-01
reference_id GLSA-202310-01
reference_type
scores
url https://security.gentoo.org/glsa/202310-01
5
reference_url https://usn.ubuntu.com/5887-1/
reference_id USN-5887-1
reference_type
scores
url https://usn.ubuntu.com/5887-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
1
vulnerability VCID-63vt-1nc8-6kfc
2
vulnerability VCID-ggz7-h35v-p7ep
3
vulnerability VCID-vdhk-r67a-s3fr
4
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1
aliases CVE-2023-20032
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4z4r-2w8m-r7dz
6
url VCID-5hnm-hz17-2bey
vulnerability_id VCID-5hnm-hz17-2bey
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15961
reference_id
reference_type
scores
0
value 0.02206
scoring_system epss
scoring_elements 0.84373
published_at 2026-04-01T12:55:00Z
1
value 0.02206
scoring_system epss
scoring_elements 0.84388
published_at 2026-04-02T12:55:00Z
2
value 0.02206
scoring_system epss
scoring_elements 0.84408
published_at 2026-04-04T12:55:00Z
3
value 0.02206
scoring_system epss
scoring_elements 0.84411
published_at 2026-04-07T12:55:00Z
4
value 0.02206
scoring_system epss
scoring_elements 0.84432
published_at 2026-04-08T12:55:00Z
5
value 0.02206
scoring_system epss
scoring_elements 0.84437
published_at 2026-04-09T12:55:00Z
6
value 0.02206
scoring_system epss
scoring_elements 0.84456
published_at 2026-04-11T12:55:00Z
7
value 0.02206
scoring_system epss
scoring_elements 0.8445
published_at 2026-04-12T12:55:00Z
8
value 0.02206
scoring_system epss
scoring_elements 0.84446
published_at 2026-04-13T12:55:00Z
9
value 0.02206
scoring_system epss
scoring_elements 0.84468
published_at 2026-04-16T12:55:00Z
10
value 0.02206
scoring_system epss
scoring_elements 0.84469
published_at 2026-04-18T12:55:00Z
11
value 0.02206
scoring_system epss
scoring_elements 0.8447
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15961
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15961
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945265
reference_id 945265
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945265
4
reference_url https://quickview.cloudapps.cisco.com/quickview/bug/CSCvr56010
reference_id CSCvr56010
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:50Z/
url https://quickview.cloudapps.cisco.com/quickview/bug/CSCvr56010
5
reference_url https://security.gentoo.org/glsa/202003-46
reference_id GLSA-202003-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:50Z/
url https://security.gentoo.org/glsa/202003-46
6
reference_url https://lists.debian.org/debian-lts-announce/2020/02/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:50Z/
url https://lists.debian.org/debian-lts-announce/2020/02/msg00016.html
7
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=12380
reference_id show_bug.cgi?id=12380
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:50Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=12380
8
reference_url https://usn.ubuntu.com/4230-1/
reference_id USN-4230-1
reference_type
scores
url https://usn.ubuntu.com/4230-1/
9
reference_url https://usn.ubuntu.com/4230-2/
reference_id USN-4230-2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:50Z/
url https://usn.ubuntu.com/4230-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-15961
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hnm-hz17-2bey
7
url VCID-63vt-1nc8-6kfc
vulnerability_id VCID-63vt-1nc8-6kfc
summary A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20260
reference_id
reference_type
scores
0
value 0.00739
scoring_system epss
scoring_elements 0.72859
published_at 2026-04-09T12:55:00Z
1
value 0.00739
scoring_system epss
scoring_elements 0.7286
published_at 2026-04-13T12:55:00Z
2
value 0.00739
scoring_system epss
scoring_elements 0.72811
published_at 2026-04-02T12:55:00Z
3
value 0.00739
scoring_system epss
scoring_elements 0.72867
published_at 2026-04-12T12:55:00Z
4
value 0.00739
scoring_system epss
scoring_elements 0.72883
published_at 2026-04-11T12:55:00Z
5
value 0.00739
scoring_system epss
scoring_elements 0.72831
published_at 2026-04-04T12:55:00Z
6
value 0.00739
scoring_system epss
scoring_elements 0.72807
published_at 2026-04-07T12:55:00Z
7
value 0.00739
scoring_system epss
scoring_elements 0.72845
published_at 2026-04-08T12:55:00Z
8
value 0.01474
scoring_system epss
scoring_elements 0.80983
published_at 2026-04-21T12:55:00Z
9
value 0.01474
scoring_system epss
scoring_elements 0.80981
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20260
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20260
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108046
reference_id 1108046
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108046
4
reference_url https://security.archlinux.org/AVG-2903
reference_id AVG-2903
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2903
5
reference_url https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
reference_id clamav-143-and-109-security-patch.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T17:49:35Z/
url https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
6
reference_url https://usn.ubuntu.com/7615-1/
reference_id USN-7615-1
reference_type
scores
url https://usn.ubuntu.com/7615-1/
7
reference_url https://usn.ubuntu.com/7615-2/
reference_id USN-7615-2
reference_type
scores
url https://usn.ubuntu.com/7615-2/
fixed_packages
0
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1~deb12u2
aliases CVE-2025-20260
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63vt-1nc8-6kfc
8
url VCID-7dcd-v8q9-b3bv
vulnerability_id VCID-7dcd-v8q9-b3bv
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15378
reference_id
reference_type
scores
0
value 0.01624
scoring_system epss
scoring_elements 0.81783
published_at 2026-04-01T12:55:00Z
1
value 0.01624
scoring_system epss
scoring_elements 0.81814
published_at 2026-04-07T12:55:00Z
2
value 0.01624
scoring_system epss
scoring_elements 0.8184
published_at 2026-04-08T12:55:00Z
3
value 0.01624
scoring_system epss
scoring_elements 0.81847
published_at 2026-04-09T12:55:00Z
4
value 0.01624
scoring_system epss
scoring_elements 0.81866
published_at 2026-04-11T12:55:00Z
5
value 0.01624
scoring_system epss
scoring_elements 0.81854
published_at 2026-04-12T12:55:00Z
6
value 0.01624
scoring_system epss
scoring_elements 0.81849
published_at 2026-04-13T12:55:00Z
7
value 0.01624
scoring_system epss
scoring_elements 0.81886
published_at 2026-04-18T12:55:00Z
8
value 0.01624
scoring_system epss
scoring_elements 0.81888
published_at 2026-04-21T12:55:00Z
9
value 0.01624
scoring_system epss
scoring_elements 0.81794
published_at 2026-04-02T12:55:00Z
10
value 0.01624
scoring_system epss
scoring_elements 0.81817
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15378
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15378
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://secuniaresearch.flexerasoftware.com/advisories/83000/
reference_id 83000
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T18:47:40Z/
url https://secuniaresearch.flexerasoftware.com/advisories/83000/
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910430
reference_id 910430
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910430
5
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T18:47:40Z/
url https://security.gentoo.org/glsa/201904-12
6
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T18:47:40Z/
url https://lists.debian.org/debian-lts-announce/2018/10/msg00014.html
7
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=12170
reference_id show_bug.cgi?id=12170
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T18:47:40Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=12170
8
reference_url https://www.flexera.com/company/secunia-research/advisories/SR-2018-23.html
reference_id SR-2018-23.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T18:47:40Z/
url https://www.flexera.com/company/secunia-research/advisories/SR-2018-23.html
9
reference_url https://usn.ubuntu.com/3789-1/
reference_id USN-3789-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T18:47:40Z/
url https://usn.ubuntu.com/3789-1/
10
reference_url https://usn.ubuntu.com/3789-2/
reference_id USN-3789-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T18:47:40Z/
url https://usn.ubuntu.com/3789-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2018-15378
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7dcd-v8q9-b3bv
9
url VCID-8s2g-2brb-tfhq
vulnerability_id VCID-8s2g-2brb-tfhq
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1786
reference_id
reference_type
scores
0
value 0.03741
scoring_system epss
scoring_elements 0.87954
published_at 2026-04-01T12:55:00Z
1
value 0.03741
scoring_system epss
scoring_elements 0.87964
published_at 2026-04-02T12:55:00Z
2
value 0.03741
scoring_system epss
scoring_elements 0.87978
published_at 2026-04-04T12:55:00Z
3
value 0.03741
scoring_system epss
scoring_elements 0.87982
published_at 2026-04-07T12:55:00Z
4
value 0.03741
scoring_system epss
scoring_elements 0.88002
published_at 2026-04-08T12:55:00Z
5
value 0.03741
scoring_system epss
scoring_elements 0.88009
published_at 2026-04-09T12:55:00Z
6
value 0.03741
scoring_system epss
scoring_elements 0.8802
published_at 2026-04-11T12:55:00Z
7
value 0.03741
scoring_system epss
scoring_elements 0.88013
published_at 2026-04-13T12:55:00Z
8
value 0.03741
scoring_system epss
scoring_elements 0.88027
published_at 2026-04-16T12:55:00Z
9
value 0.03741
scoring_system epss
scoring_elements 0.88025
published_at 2026-04-18T12:55:00Z
10
value 0.03741
scoring_system epss
scoring_elements 0.88026
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1786
1
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12149
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:57Z/
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12149
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12168
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:57Z/
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12168
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1786
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:0.101.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:0.101.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:0.101.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:0.101.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:0.101.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:0.101.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-1786
reference_id CVE-2019-1786
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-1786
8
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:57Z/
url https://security.gentoo.org/glsa/201904-12
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-1786
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8s2g-2brb-tfhq
10
url VCID-8y9g-m17c-kyey
vulnerability_id VCID-8y9g-m17c-kyey
summary ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted mew packer executable.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1371
reference_id
reference_type
scores
0
value 0.00515
scoring_system epss
scoring_elements 0.66626
published_at 2026-04-21T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66521
published_at 2026-04-01T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.6656
published_at 2026-04-02T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66585
published_at 2026-04-04T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.66557
published_at 2026-04-07T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.66605
published_at 2026-04-08T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66618
published_at 2026-04-09T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66636
published_at 2026-04-11T12:55:00Z
8
value 0.00515
scoring_system epss
scoring_elements 0.66624
published_at 2026-04-12T12:55:00Z
9
value 0.00515
scoring_system epss
scoring_elements 0.66591
published_at 2026-04-13T12:55:00Z
10
value 0.00515
scoring_system epss
scoring_elements 0.66627
published_at 2026-04-16T12:55:00Z
11
value 0.00515
scoring_system epss
scoring_elements 0.66642
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1371
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1371
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/3093-1/
reference_id USN-3093-1
reference_type
scores
url https://usn.ubuntu.com/3093-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2016-1371
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8y9g-m17c-kyey
11
url VCID-a4nz-5cr8-13an
vulnerability_id VCID-a4nz-5cr8-13an
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1789
reference_id
reference_type
scores
0
value 0.00596
scoring_system epss
scoring_elements 0.69399
published_at 2026-04-18T12:55:00Z
1
value 0.00596
scoring_system epss
scoring_elements 0.69379
published_at 2026-04-21T12:55:00Z
2
value 0.00596
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-12T12:55:00Z
3
value 0.00596
scoring_system epss
scoring_elements 0.6935
published_at 2026-04-13T12:55:00Z
4
value 0.00596
scoring_system epss
scoring_elements 0.69388
published_at 2026-04-16T12:55:00Z
5
value 0.00596
scoring_system epss
scoring_elements 0.6928
published_at 2026-04-01T12:55:00Z
6
value 0.00596
scoring_system epss
scoring_elements 0.69293
published_at 2026-04-02T12:55:00Z
7
value 0.00596
scoring_system epss
scoring_elements 0.6931
published_at 2026-04-04T12:55:00Z
8
value 0.00596
scoring_system epss
scoring_elements 0.6929
published_at 2026-04-07T12:55:00Z
9
value 0.00596
scoring_system epss
scoring_elements 0.6934
published_at 2026-04-08T12:55:00Z
10
value 0.00596
scoring_system epss
scoring_elements 0.69357
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1789
1
reference_url https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:22:31Z/
url https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-1789
reference_id CVE-2019-1789
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-1789
6
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
url https://security.gentoo.org/glsa/201904-12
7
reference_url https://usn.ubuntu.com/3940-1/
reference_id USN-3940-1
reference_type
scores
url https://usn.ubuntu.com/3940-1/
8
reference_url https://usn.ubuntu.com/3940-2/
reference_id USN-3940-2
reference_type
scores
url https://usn.ubuntu.com/3940-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-1789
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4nz-5cr8-13an
12
url VCID-aagg-bbac-rfez
vulnerability_id VCID-aagg-bbac-rfez
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6420
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.5214
published_at 2026-04-21T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52154
published_at 2026-04-16T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52158
published_at 2026-04-18T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52003
published_at 2026-04-01T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52051
published_at 2026-04-02T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52078
published_at 2026-04-04T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52043
published_at 2026-04-07T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52097
published_at 2026-04-08T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52094
published_at 2026-04-09T12:55:00Z
9
value 0.00286
scoring_system epss
scoring_elements 0.52146
published_at 2026-04-11T12:55:00Z
10
value 0.00286
scoring_system epss
scoring_elements 0.52129
published_at 2026-04-12T12:55:00Z
11
value 0.00286
scoring_system epss
scoring_elements 0.52114
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6420
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6420
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
4
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
5
reference_url https://security.gentoo.org/glsa/201804-16
reference_id GLSA-201804-16
reference_type
scores
url https://security.gentoo.org/glsa/201804-16
6
reference_url https://usn.ubuntu.com/3393-1/
reference_id USN-3393-1
reference_type
scores
url https://usn.ubuntu.com/3393-1/
7
reference_url https://usn.ubuntu.com/3393-2/
reference_id USN-3393-2
reference_type
scores
url https://usn.ubuntu.com/3393-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-6420
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aagg-bbac-rfez
13
url VCID-avvd-1gv9-eyb9
vulnerability_id VCID-avvd-1gv9-eyb9
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-0202
reference_id
reference_type
scores
0
value 0.02179
scoring_system epss
scoring_elements 0.8437
published_at 2026-04-21T12:55:00Z
1
value 0.02179
scoring_system epss
scoring_elements 0.84332
published_at 2026-04-08T12:55:00Z
2
value 0.02179
scoring_system epss
scoring_elements 0.84337
published_at 2026-04-09T12:55:00Z
3
value 0.02179
scoring_system epss
scoring_elements 0.84356
published_at 2026-04-11T12:55:00Z
4
value 0.02179
scoring_system epss
scoring_elements 0.84348
published_at 2026-04-12T12:55:00Z
5
value 0.02179
scoring_system epss
scoring_elements 0.84344
published_at 2026-04-13T12:55:00Z
6
value 0.02179
scoring_system epss
scoring_elements 0.84366
published_at 2026-04-16T12:55:00Z
7
value 0.02179
scoring_system epss
scoring_elements 0.84367
published_at 2026-04-18T12:55:00Z
8
value 0.02179
scoring_system epss
scoring_elements 0.84276
published_at 2026-04-01T12:55:00Z
9
value 0.02179
scoring_system epss
scoring_elements 0.84289
published_at 2026-04-02T12:55:00Z
10
value 0.02179
scoring_system epss
scoring_elements 0.84309
published_at 2026-04-04T12:55:00Z
11
value 0.02179
scoring_system epss
scoring_elements 0.8431
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-0202
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0202
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/ASA-201803-14
reference_id ASA-201803-14
reference_type
scores
url https://security.archlinux.org/ASA-201803-14
4
reference_url https://security.archlinux.org/AVG-602
reference_id AVG-602
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-602
5
reference_url https://security.gentoo.org/glsa/201804-16
reference_id GLSA-201804-16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:54:26Z/
url https://security.gentoo.org/glsa/201804-16
6
reference_url https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:54:26Z/
url https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html
7
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11973
reference_id show_bug.cgi?id=11973
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:54:26Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11973
8
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11980
reference_id show_bug.cgi?id=11980
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:54:26Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11980
9
reference_url https://usn.ubuntu.com/3592-1/
reference_id USN-3592-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:54:26Z/
url https://usn.ubuntu.com/3592-1/
10
reference_url https://usn.ubuntu.com/3592-2/
reference_id USN-3592-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:54:26Z/
url https://usn.ubuntu.com/3592-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2018-0202
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-avvd-1gv9-eyb9
14
url VCID-cc9p-w184-zfej
vulnerability_id VCID-cc9p-w184-zfej
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-3327
reference_id
reference_type
scores
0
value 0.07618
scoring_system epss
scoring_elements 0.91822
published_at 2026-04-01T12:55:00Z
1
value 0.07618
scoring_system epss
scoring_elements 0.9183
published_at 2026-04-02T12:55:00Z
2
value 0.07618
scoring_system epss
scoring_elements 0.91836
published_at 2026-04-04T12:55:00Z
3
value 0.07618
scoring_system epss
scoring_elements 0.91845
published_at 2026-04-07T12:55:00Z
4
value 0.07618
scoring_system epss
scoring_elements 0.91857
published_at 2026-04-08T12:55:00Z
5
value 0.07618
scoring_system epss
scoring_elements 0.91863
published_at 2026-04-09T12:55:00Z
6
value 0.07618
scoring_system epss
scoring_elements 0.91866
published_at 2026-04-11T12:55:00Z
7
value 0.07618
scoring_system epss
scoring_elements 0.91867
published_at 2026-04-12T12:55:00Z
8
value 0.07618
scoring_system epss
scoring_elements 0.91862
published_at 2026-04-13T12:55:00Z
9
value 0.07618
scoring_system epss
scoring_elements 0.91882
published_at 2026-04-16T12:55:00Z
10
value 0.07618
scoring_system epss
scoring_elements 0.91878
published_at 2026-04-18T12:55:00Z
11
value 0.07618
scoring_system epss
scoring_elements 0.91876
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-3327
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/
reference_id 3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/
3
reference_url https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
reference_id clamav-01023-security-patch-released.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
4
reference_url https://security.gentoo.org/glsa/202007-23
reference_id GLSA-202007-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://security.gentoo.org/glsa/202007-23
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
reference_id IJ67VH37NCG25PICGWFWZHSVG7PBT7MC
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/
reference_id L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/
7
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html
8
reference_url https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
reference_id QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/
reference_id ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/
11
reference_url https://usn.ubuntu.com/4370-1/
reference_id USN-4370-1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://usn.ubuntu.com/4370-1/
12
reference_url https://usn.ubuntu.com/4370-2/
reference_id USN-4370-2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://usn.ubuntu.com/4370-2/
13
reference_url https://usn.ubuntu.com/4435-1/
reference_id USN-4435-1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://usn.ubuntu.com/4435-1/
14
reference_url https://usn.ubuntu.com/4435-2/
reference_id USN-4435-2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/
url https://usn.ubuntu.com/4435-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2020-3327
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cc9p-w184-zfej
15
url VCID-cysq-fdzg-13dd
vulnerability_id VCID-cysq-fdzg-13dd
summary ClamAV versions prior to 0.103.0-rc contain a vulnerability in function name processing through the ClamBC bytecode interpreter that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to potentially execute malicious bytecode or cause unexpected behavior in the ClamAV engine.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-37167
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00411
published_at 2026-04-07T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00418
published_at 2026-04-04T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00415
published_at 2026-04-01T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00401
published_at 2026-04-18T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00397
published_at 2026-04-16T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00402
published_at 2026-04-13T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00404
published_at 2026-04-12T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00408
published_at 2026-04-09T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00407
published_at 2026-04-11T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.0048
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-37167
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-37167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-37167
2
reference_url https://www.exploit-db.com/exploits/47687
reference_id 47687
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T17:08:35Z/
url https://www.exploit-db.com/exploits/47687
3
reference_url https://github.com/Cisco-Talos/clamav/commit/cd2f2975b93277de7f74464d48adb378375a305f
reference_id cd2f2975b93277de7f74464d48adb378375a305f
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T17:08:35Z/
url https://github.com/Cisco-Talos/clamav/commit/cd2f2975b93277de7f74464d48adb378375a305f
4
reference_url https://www.vulncheck.com/advisories/clamav-clambc-clambc-executable-regular-expression-error
reference_id clamav-clambc-clambc-executable-regular-expression-error
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T17:08:35Z/
url https://www.vulncheck.com/advisories/clamav-clambc-clambc-executable-regular-expression-error
5
reference_url https://www.clamav.net/
reference_id www.clamav.net
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T17:08:35Z/
url https://www.clamav.net/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2020-37167
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cysq-fdzg-13dd
16
url VCID-d3u3-epeb-guh9
vulnerability_id VCID-d3u3-epeb-guh9
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-20052
reference_id
reference_type
scores
0
value 0.03563
scoring_system epss
scoring_elements 0.87702
published_at 2026-04-08T12:55:00Z
1
value 0.03563
scoring_system epss
scoring_elements 0.87708
published_at 2026-04-09T12:55:00Z
2
value 0.05699
scoring_system epss
scoring_elements 0.90427
published_at 2026-04-21T12:55:00Z
3
value 0.05699
scoring_system epss
scoring_elements 0.90421
published_at 2026-04-11T12:55:00Z
4
value 0.05699
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-12T12:55:00Z
5
value 0.05699
scoring_system epss
scoring_elements 0.90413
published_at 2026-04-13T12:55:00Z
6
value 0.05699
scoring_system epss
scoring_elements 0.90429
published_at 2026-04-18T12:55:00Z
7
value 0.06327
scoring_system epss
scoring_elements 0.90953
published_at 2026-04-07T12:55:00Z
8
value 0.06327
scoring_system epss
scoring_elements 0.90942
published_at 2026-04-04T12:55:00Z
9
value 0.06327
scoring_system epss
scoring_elements 0.90933
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-20052
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20052
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031509
reference_id 1031509
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031509
4
reference_url https://security.gentoo.org/glsa/202310-01
reference_id GLSA-202310-01
reference_type
scores
url https://security.gentoo.org/glsa/202310-01
5
reference_url https://usn.ubuntu.com/5887-1/
reference_id USN-5887-1
reference_type
scores
url https://usn.ubuntu.com/5887-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
1
vulnerability VCID-63vt-1nc8-6kfc
2
vulnerability VCID-ggz7-h35v-p7ep
3
vulnerability VCID-vdhk-r67a-s3fr
4
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1
aliases CVE-2023-20052
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3u3-epeb-guh9
17
url VCID-dn26-zfsc-ryec
vulnerability_id VCID-dn26-zfsc-ryec
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20785
reference_id
reference_type
scores
0
value 0.01018
scoring_system epss
scoring_elements 0.77146
published_at 2026-04-07T12:55:00Z
1
value 0.01018
scoring_system epss
scoring_elements 0.77191
published_at 2026-04-13T12:55:00Z
2
value 0.01018
scoring_system epss
scoring_elements 0.77194
published_at 2026-04-12T12:55:00Z
3
value 0.01018
scoring_system epss
scoring_elements 0.77215
published_at 2026-04-11T12:55:00Z
4
value 0.01018
scoring_system epss
scoring_elements 0.77188
published_at 2026-04-09T12:55:00Z
5
value 0.01018
scoring_system epss
scoring_elements 0.77165
published_at 2026-04-04T12:55:00Z
6
value 0.01018
scoring_system epss
scoring_elements 0.77179
published_at 2026-04-08T12:55:00Z
7
value 0.01018
scoring_system epss
scoring_elements 0.77135
published_at 2026-04-02T12:55:00Z
8
value 0.01018
scoring_system epss
scoring_elements 0.77224
published_at 2026-04-21T12:55:00Z
9
value 0.01018
scoring_system epss
scoring_elements 0.77232
published_at 2026-04-18T12:55:00Z
10
value 0.01018
scoring_system epss
scoring_elements 0.77231
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20785
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20785
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
reference_id 7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
4
reference_url https://security.archlinux.org/AVG-2722
reference_id AVG-2722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2722
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
reference_id BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
6
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR
reference_id cisco-sa-clamav-html-XAuOK8mR
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:30Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR
7
reference_url https://security.gentoo.org/glsa/202310-01
reference_id GLSA-202310-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:30Z/
url https://security.gentoo.org/glsa/202310-01
8
reference_url https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:30Z/
url https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
reference_id N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
10
reference_url https://usn.ubuntu.com/5423-1/
reference_id USN-5423-1
reference_type
scores
url https://usn.ubuntu.com/5423-1/
11
reference_url https://usn.ubuntu.com/5423-2/
reference_id USN-5423-2
reference_type
scores
url https://usn.ubuntu.com/5423-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
1
vulnerability VCID-63vt-1nc8-6kfc
2
vulnerability VCID-ggz7-h35v-p7ep
3
vulnerability VCID-vdhk-r67a-s3fr
4
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1
aliases CVE-2022-20785
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn26-zfsc-ryec
18
url VCID-egd5-p68y-wfdy
vulnerability_id VCID-egd5-p68y-wfdy
summary A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1404
reference_id
reference_type
scores
0
value 0.00448
scoring_system epss
scoring_elements 0.6359
published_at 2026-04-21T12:55:00Z
1
value 0.00448
scoring_system epss
scoring_elements 0.63611
published_at 2026-04-11T12:55:00Z
2
value 0.00448
scoring_system epss
scoring_elements 0.63598
published_at 2026-04-16T12:55:00Z
3
value 0.00448
scoring_system epss
scoring_elements 0.63607
published_at 2026-04-18T12:55:00Z
4
value 0.00448
scoring_system epss
scoring_elements 0.63475
published_at 2026-04-01T12:55:00Z
5
value 0.00448
scoring_system epss
scoring_elements 0.63534
published_at 2026-04-02T12:55:00Z
6
value 0.00448
scoring_system epss
scoring_elements 0.63562
published_at 2026-04-13T12:55:00Z
7
value 0.00448
scoring_system epss
scoring_elements 0.63527
published_at 2026-04-07T12:55:00Z
8
value 0.00448
scoring_system epss
scoring_elements 0.63579
published_at 2026-04-08T12:55:00Z
9
value 0.00448
scoring_system epss
scoring_elements 0.63596
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1404
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1404
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622
reference_id 986622
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622
4
reference_url https://security.archlinux.org/AVG-1787
reference_id AVG-1787
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1787
5
reference_url https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html
reference_id clamav-01032-security-patch-release.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:31Z/
url https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html
6
reference_url https://usn.ubuntu.com/4918-1/
reference_id USN-4918-1
reference_type
scores
url https://usn.ubuntu.com/4918-1/
7
reference_url https://usn.ubuntu.com/4918-2/
reference_id USN-4918-2
reference_type
scores
url https://usn.ubuntu.com/4918-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2021-1404
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-egd5-p68y-wfdy
19
url VCID-fp31-7krz-abbs
vulnerability_id VCID-fp31-7krz-abbs
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20770
reference_id
reference_type
scores
0
value 0.00861
scoring_system epss
scoring_elements 0.75044
published_at 2026-04-13T12:55:00Z
1
value 0.00861
scoring_system epss
scoring_elements 0.75055
published_at 2026-04-12T12:55:00Z
2
value 0.00861
scoring_system epss
scoring_elements 0.75076
published_at 2026-04-11T12:55:00Z
3
value 0.00861
scoring_system epss
scoring_elements 0.75079
published_at 2026-04-21T12:55:00Z
4
value 0.00861
scoring_system epss
scoring_elements 0.75089
published_at 2026-04-18T12:55:00Z
5
value 0.00861
scoring_system epss
scoring_elements 0.75081
published_at 2026-04-16T12:55:00Z
6
value 0.00885
scoring_system epss
scoring_elements 0.75384
published_at 2026-04-07T12:55:00Z
7
value 0.00885
scoring_system epss
scoring_elements 0.75372
published_at 2026-04-02T12:55:00Z
8
value 0.00885
scoring_system epss
scoring_elements 0.75405
published_at 2026-04-04T12:55:00Z
9
value 0.00885
scoring_system epss
scoring_elements 0.75436
published_at 2026-04-09T12:55:00Z
10
value 0.00885
scoring_system epss
scoring_elements 0.75427
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20770
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20770
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
reference_id 7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
4
reference_url https://security.archlinux.org/AVG-2722
reference_id AVG-2722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2722
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
reference_id BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
6
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd
reference_id cisco-sa-clamav-dos-prVGcHLd
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:32Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd
7
reference_url https://security.gentoo.org/glsa/202310-01
reference_id GLSA-202310-01
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:32Z/
url https://security.gentoo.org/glsa/202310-01
8
reference_url https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:32Z/
url https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
reference_id N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
10
reference_url https://usn.ubuntu.com/5423-1/
reference_id USN-5423-1
reference_type
scores
url https://usn.ubuntu.com/5423-1/
11
reference_url https://usn.ubuntu.com/5423-2/
reference_id USN-5423-2
reference_type
scores
url https://usn.ubuntu.com/5423-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
1
vulnerability VCID-63vt-1nc8-6kfc
2
vulnerability VCID-ggz7-h35v-p7ep
3
vulnerability VCID-vdhk-r67a-s3fr
4
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1
aliases CVE-2022-20770
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fp31-7krz-abbs
20
url VCID-ggz7-h35v-p7ep
vulnerability_id VCID-ggz7-h35v-p7ep
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20505
reference_id
reference_type
scores
0
value 0.00803
scoring_system epss
scoring_elements 0.74059
published_at 2026-04-07T12:55:00Z
1
value 0.00803
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-09T12:55:00Z
2
value 0.00803
scoring_system epss
scoring_elements 0.74092
published_at 2026-04-08T12:55:00Z
3
value 0.00803
scoring_system epss
scoring_elements 0.74062
published_at 2026-04-02T12:55:00Z
4
value 0.00803
scoring_system epss
scoring_elements 0.74088
published_at 2026-04-04T12:55:00Z
5
value 0.0089
scoring_system epss
scoring_elements 0.75558
published_at 2026-04-21T12:55:00Z
6
value 0.0089
scoring_system epss
scoring_elements 0.75523
published_at 2026-04-13T12:55:00Z
7
value 0.0089
scoring_system epss
scoring_elements 0.75566
published_at 2026-04-16T12:55:00Z
8
value 0.0089
scoring_system epss
scoring_elements 0.75571
published_at 2026-04-18T12:55:00Z
9
value 0.0089
scoring_system epss
scoring_elements 0.75554
published_at 2026-04-11T12:55:00Z
10
value 0.0089
scoring_system epss
scoring_elements 0.75532
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20505
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20505
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080962
reference_id 1080962
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080962
4
reference_url https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html
reference_id clamav-141-132-107-and-010312-security.html
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T13:35:13Z/
url https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html
5
reference_url https://security.gentoo.org/glsa/202507-03
reference_id GLSA-202507-03
reference_type
scores
url https://security.gentoo.org/glsa/202507-03
6
reference_url https://usn.ubuntu.com/7011-1/
reference_id USN-7011-1
reference_type
scores
url https://usn.ubuntu.com/7011-1/
7
reference_url https://usn.ubuntu.com/7011-2/
reference_id USN-7011-2
reference_type
scores
url https://usn.ubuntu.com/7011-2/
fixed_packages
0
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1~deb12u2
aliases CVE-2024-20505
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggz7-h35v-p7ep
21
url VCID-guz8-mfzu-uuc9
vulnerability_id VCID-guz8-mfzu-uuc9
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6419.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6419
reference_id
reference_type
scores
0
value 0.02123
scoring_system epss
scoring_elements 0.84079
published_at 2026-04-01T12:55:00Z
1
value 0.02123
scoring_system epss
scoring_elements 0.84111
published_at 2026-04-07T12:55:00Z
2
value 0.02123
scoring_system epss
scoring_elements 0.84092
published_at 2026-04-02T12:55:00Z
3
value 0.02123
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-04T12:55:00Z
4
value 0.02123
scoring_system epss
scoring_elements 0.84134
published_at 2026-04-08T12:55:00Z
5
value 0.02123
scoring_system epss
scoring_elements 0.8414
published_at 2026-04-09T12:55:00Z
6
value 0.02123
scoring_system epss
scoring_elements 0.84158
published_at 2026-04-11T12:55:00Z
7
value 0.02123
scoring_system epss
scoring_elements 0.84152
published_at 2026-04-12T12:55:00Z
8
value 0.02272
scoring_system epss
scoring_elements 0.84676
published_at 2026-04-18T12:55:00Z
9
value 0.02272
scoring_system epss
scoring_elements 0.84677
published_at 2026-04-21T12:55:00Z
10
value 0.02462
scoring_system epss
scoring_elements 0.85266
published_at 2026-04-16T12:55:00Z
11
value 0.02462
scoring_system epss
scoring_elements 0.85246
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1483909
reference_id 1483909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1483909
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871263
reference_id 871263
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871263
7
reference_url https://security.archlinux.org/ASA-201802-9
reference_id ASA-201802-9
reference_type
scores
url https://security.archlinux.org/ASA-201802-9
8
reference_url https://security.archlinux.org/ASA-201803-14
reference_id ASA-201803-14
reference_type
scores
url https://security.archlinux.org/ASA-201803-14
9
reference_url https://security.archlinux.org/AVG-602
reference_id AVG-602
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-602
10
reference_url https://security.archlinux.org/AVG-603
reference_id AVG-603
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-603
11
reference_url https://security.gentoo.org/glsa/201804-16
reference_id GLSA-201804-16
reference_type
scores
url https://security.gentoo.org/glsa/201804-16
12
reference_url https://usn.ubuntu.com/3393-1/
reference_id USN-3393-1
reference_type
scores
url https://usn.ubuntu.com/3393-1/
13
reference_url https://usn.ubuntu.com/3393-2/
reference_id USN-3393-2
reference_type
scores
url https://usn.ubuntu.com/3393-2/
14
reference_url https://usn.ubuntu.com/3394-1/
reference_id USN-3394-1
reference_type
scores
url https://usn.ubuntu.com/3394-1/
15
reference_url https://usn.ubuntu.com/7788-1/
reference_id USN-7788-1
reference_type
scores
url https://usn.ubuntu.com/7788-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-6419
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-guz8-mfzu-uuc9
22
url VCID-h46v-x33x-t3ep
vulnerability_id VCID-h46v-x33x-t3ep
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-0360
reference_id
reference_type
scores
0
value 0.01215
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-01T12:55:00Z
1
value 0.01215
scoring_system epss
scoring_elements 0.79006
published_at 2026-04-04T12:55:00Z
2
value 0.01215
scoring_system epss
scoring_elements 0.78991
published_at 2026-04-07T12:55:00Z
3
value 0.01215
scoring_system epss
scoring_elements 0.79015
published_at 2026-04-08T12:55:00Z
4
value 0.01215
scoring_system epss
scoring_elements 0.79022
published_at 2026-04-09T12:55:00Z
5
value 0.01215
scoring_system epss
scoring_elements 0.79046
published_at 2026-04-11T12:55:00Z
6
value 0.01215
scoring_system epss
scoring_elements 0.7903
published_at 2026-04-12T12:55:00Z
7
value 0.01215
scoring_system epss
scoring_elements 0.7902
published_at 2026-04-13T12:55:00Z
8
value 0.01215
scoring_system epss
scoring_elements 0.79048
published_at 2026-04-16T12:55:00Z
9
value 0.01215
scoring_system epss
scoring_elements 0.79045
published_at 2026-04-18T12:55:00Z
10
value 0.01215
scoring_system epss
scoring_elements 0.79044
published_at 2026-04-21T12:55:00Z
11
value 0.01215
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-0360
1
reference_url https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:29Z/
url https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0360
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:29Z/
url https://lists.debian.org/debian-lts-announce/2018/08/msg00020.html
5
reference_url https://secuniaresearch.flexerasoftware.com/secunia_research/2018-12/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:29Z/
url https://secuniaresearch.flexerasoftware.com/secunia_research/2018-12/
6
reference_url http://www.securitytracker.com/id/1041367
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:29Z/
url http://www.securitytracker.com/id/1041367
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-0360
reference_id CVE-2018-0360
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-0360
14
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:29Z/
url https://security.gentoo.org/glsa/201904-12
15
reference_url https://usn.ubuntu.com/3722-1/
reference_id USN-3722-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:29Z/
url https://usn.ubuntu.com/3722-1/
16
reference_url https://usn.ubuntu.com/3722-2/
reference_id USN-3722-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:29Z/
url https://usn.ubuntu.com/3722-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2018-0360
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h46v-x33x-t3ep
23
url VCID-j2gt-uvam-hufk
vulnerability_id VCID-j2gt-uvam-hufk
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12377
reference_id
reference_type
scores
0
value 0.21357
scoring_system epss
scoring_elements 0.95706
published_at 2026-04-21T12:55:00Z
1
value 0.21357
scoring_system epss
scoring_elements 0.95692
published_at 2026-04-11T12:55:00Z
2
value 0.21357
scoring_system epss
scoring_elements 0.95691
published_at 2026-04-12T12:55:00Z
3
value 0.21357
scoring_system epss
scoring_elements 0.95693
published_at 2026-04-13T12:55:00Z
4
value 0.21357
scoring_system epss
scoring_elements 0.95701
published_at 2026-04-16T12:55:00Z
5
value 0.21357
scoring_system epss
scoring_elements 0.95705
published_at 2026-04-18T12:55:00Z
6
value 0.21357
scoring_system epss
scoring_elements 0.95659
published_at 2026-04-01T12:55:00Z
7
value 0.21357
scoring_system epss
scoring_elements 0.95667
published_at 2026-04-02T12:55:00Z
8
value 0.21357
scoring_system epss
scoring_elements 0.95673
published_at 2026-04-04T12:55:00Z
9
value 0.21357
scoring_system epss
scoring_elements 0.95676
published_at 2026-04-07T12:55:00Z
10
value 0.21357
scoring_system epss
scoring_elements 0.95684
published_at 2026-04-08T12:55:00Z
11
value 0.21357
scoring_system epss
scoring_elements 0.95688
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12377
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12377
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
reference_id 888484
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
4
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
5
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
6
reference_url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
reference_id clamav-0993-has-been-released.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:17Z/
url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
7
reference_url https://security.gentoo.org/glsa/201801-19
reference_id GLSA-201801-19
reference_type
scores
url https://security.gentoo.org/glsa/201801-19
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:17Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
9
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11943
reference_id show_bug.cgi?id=11943
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:17Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11943
10
reference_url https://usn.ubuntu.com/3550-1/
reference_id USN-3550-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:17Z/
url https://usn.ubuntu.com/3550-1/
11
reference_url https://usn.ubuntu.com/3550-2/
reference_id USN-3550-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:17Z/
url https://usn.ubuntu.com/3550-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-12377
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2gt-uvam-hufk
24
url VCID-kurn-1uay-qqap
vulnerability_id VCID-kurn-1uay-qqap
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20792
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34012
published_at 2026-04-21T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34092
published_at 2026-04-09T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.3409
published_at 2026-04-11T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34048
published_at 2026-04-12T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34024
published_at 2026-04-13T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-16T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34047
published_at 2026-04-18T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.34126
published_at 2026-04-02T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.34157
published_at 2026-04-04T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.34018
published_at 2026-04-07T12:55:00Z
10
value 0.00139
scoring_system epss
scoring_elements 0.34061
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20792
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20792
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/AVG-2722
reference_id AVG-2722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2722
4
reference_url https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html
reference_id clamav-01050-01043-01036-released.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-01T18:42:21Z/
url https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html
5
reference_url https://security.gentoo.org/glsa/202310-01
reference_id GLSA-202310-01
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-01T18:42:21Z/
url https://security.gentoo.org/glsa/202310-01
6
reference_url https://usn.ubuntu.com/5423-1/
reference_id USN-5423-1
reference_type
scores
url https://usn.ubuntu.com/5423-1/
7
reference_url https://usn.ubuntu.com/5423-2/
reference_id USN-5423-2
reference_type
scores
url https://usn.ubuntu.com/5423-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
1
vulnerability VCID-63vt-1nc8-6kfc
2
vulnerability VCID-ggz7-h35v-p7ep
3
vulnerability VCID-vdhk-r67a-s3fr
4
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1
aliases CVE-2022-20792
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kurn-1uay-qqap
25
url VCID-mdfk-5ked-t3bu
vulnerability_id VCID-mdfk-5ked-t3bu
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-20197
reference_id
reference_type
scores
0
value 0.00438
scoring_system epss
scoring_elements 0.63167
published_at 2026-04-18T12:55:00Z
1
value 0.00438
scoring_system epss
scoring_elements 0.63082
published_at 2026-04-02T12:55:00Z
2
value 0.00438
scoring_system epss
scoring_elements 0.63111
published_at 2026-04-04T12:55:00Z
3
value 0.00438
scoring_system epss
scoring_elements 0.63076
published_at 2026-04-07T12:55:00Z
4
value 0.00438
scoring_system epss
scoring_elements 0.63128
published_at 2026-04-08T12:55:00Z
5
value 0.00438
scoring_system epss
scoring_elements 0.63146
published_at 2026-04-09T12:55:00Z
6
value 0.00438
scoring_system epss
scoring_elements 0.63163
published_at 2026-04-11T12:55:00Z
7
value 0.00438
scoring_system epss
scoring_elements 0.63148
published_at 2026-04-21T12:55:00Z
8
value 0.00438
scoring_system epss
scoring_elements 0.63125
published_at 2026-04-13T12:55:00Z
9
value 0.00438
scoring_system epss
scoring_elements 0.6316
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-20197
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20197
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050057
reference_id 1050057
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050057
4
reference_url https://security.gentoo.org/glsa/202507-03
reference_id GLSA-202507-03
reference_type
scores
url https://security.gentoo.org/glsa/202507-03
5
reference_url https://usn.ubuntu.com/6303-1/
reference_id USN-6303-1
reference_type
scores
url https://usn.ubuntu.com/6303-1/
6
reference_url https://usn.ubuntu.com/6303-2/
reference_id USN-6303-2
reference_type
scores
url https://usn.ubuntu.com/6303-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
1
vulnerability VCID-63vt-1nc8-6kfc
2
vulnerability VCID-ggz7-h35v-p7ep
3
vulnerability VCID-vdhk-r67a-s3fr
4
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1
aliases CVE-2023-20197
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mdfk-5ked-t3bu
26
url VCID-mu6w-nub4-z3ef
vulnerability_id VCID-mu6w-nub4-z3ef
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20698
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47558
published_at 2026-04-21T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47528
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47548
published_at 2026-04-12T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47572
published_at 2026-04-11T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47556
published_at 2026-04-13T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47614
published_at 2026-04-16T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47607
published_at 2026-04-18T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.47549
published_at 2026-04-04T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47497
published_at 2026-04-07T12:55:00Z
9
value 0.00243
scoring_system epss
scoring_elements 0.47552
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20698
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20698
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html
reference_id clamav-01035-and-01042-security-patch.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:57Z/
url https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html
4
reference_url https://security.gentoo.org/glsa/202310-01
reference_id GLSA-202310-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:57Z/
url https://security.gentoo.org/glsa/202310-01
5
reference_url https://usn.ubuntu.com/5233-1/
reference_id USN-5233-1
reference_type
scores
url https://usn.ubuntu.com/5233-1/
6
reference_url https://usn.ubuntu.com/5233-2/
reference_id USN-5233-2
reference_type
scores
url https://usn.ubuntu.com/5233-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2022-20698
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mu6w-nub4-z3ef
27
url VCID-mufb-kvfq-mubz
vulnerability_id VCID-mufb-kvfq-mubz
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1785
reference_id
reference_type
scores
0
value 0.00303
scoring_system epss
scoring_elements 0.53621
published_at 2026-04-21T12:55:00Z
1
value 0.00303
scoring_system epss
scoring_elements 0.53585
published_at 2026-04-08T12:55:00Z
2
value 0.00303
scoring_system epss
scoring_elements 0.53581
published_at 2026-04-09T12:55:00Z
3
value 0.00303
scoring_system epss
scoring_elements 0.53631
published_at 2026-04-11T12:55:00Z
4
value 0.00303
scoring_system epss
scoring_elements 0.53613
published_at 2026-04-12T12:55:00Z
5
value 0.00303
scoring_system epss
scoring_elements 0.53596
published_at 2026-04-13T12:55:00Z
6
value 0.00303
scoring_system epss
scoring_elements 0.53633
published_at 2026-04-16T12:55:00Z
7
value 0.00303
scoring_system epss
scoring_elements 0.53638
published_at 2026-04-18T12:55:00Z
8
value 0.00303
scoring_system epss
scoring_elements 0.53517
published_at 2026-04-01T12:55:00Z
9
value 0.00303
scoring_system epss
scoring_elements 0.5354
published_at 2026-04-02T12:55:00Z
10
value 0.00303
scoring_system epss
scoring_elements 0.53566
published_at 2026-04-04T12:55:00Z
11
value 0.00303
scoring_system epss
scoring_elements 0.53535
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1785
1
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=12284
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-19T17:21:23Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=12284
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1785
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:0.101.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:0.101.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:0.101.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:0.101.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:0.101.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:0.101.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-1785
reference_id CVE-2019-1785
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-1785
7
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-19T17:21:23Z/
url https://security.gentoo.org/glsa/201904-12
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-1785
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mufb-kvfq-mubz
28
url VCID-n51n-m2r7-kbdy
vulnerability_id VCID-n51n-m2r7-kbdy
summary bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12900.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12900
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.78111
published_at 2026-04-07T12:55:00Z
1
value 0.01111
scoring_system epss
scoring_elements 0.78174
published_at 2026-04-21T12:55:00Z
2
value 0.01111
scoring_system epss
scoring_elements 0.78179
published_at 2026-04-18T12:55:00Z
3
value 0.01111
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-16T12:55:00Z
4
value 0.01111
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-13T12:55:00Z
5
value 0.01111
scoring_system epss
scoring_elements 0.7815
published_at 2026-04-12T12:55:00Z
6
value 0.01111
scoring_system epss
scoring_elements 0.78168
published_at 2026-04-11T12:55:00Z
7
value 0.01111
scoring_system epss
scoring_elements 0.78143
published_at 2026-04-09T12:55:00Z
8
value 0.01111
scoring_system epss
scoring_elements 0.78129
published_at 2026-04-04T12:55:00Z
9
value 0.01111
scoring_system epss
scoring_elements 0.78137
published_at 2026-04-08T12:55:00Z
10
value 0.01132
scoring_system epss
scoring_elements 0.78283
published_at 2026-04-01T12:55:00Z
11
value 0.01132
scoring_system epss
scoring_elements 0.7829
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2332075
reference_id 2332075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2332075
5
reference_url https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
reference_id 74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886
reference_id 930886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359
reference_id 934359
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359
8
reference_url https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K68713584?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
10
reference_url https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
11
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
reference_id msg00040.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
14
reference_url https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
reference_id rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
reference_id rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
16
reference_url https://access.redhat.com/errata/RHSA-2024:10803
reference_id RHSA-2024:10803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10803
17
reference_url https://access.redhat.com/errata/RHSA-2024:8922
reference_id RHSA-2024:8922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8922
18
reference_url https://access.redhat.com/errata/RHSA-2025:0733
reference_id RHSA-2025:0733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0733
19
reference_url https://access.redhat.com/errata/RHSA-2025:0925
reference_id RHSA-2025:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0925
20
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
21
reference_url https://usn.ubuntu.com/4038-1/
reference_id USN-4038-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4038-1/
22
reference_url https://usn.ubuntu.com/4038-2/
reference_id USN-4038-2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4038-2/
23
reference_url https://usn.ubuntu.com/4146-1/
reference_id USN-4146-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4146-1/
24
reference_url https://usn.ubuntu.com/4146-2/
reference_id USN-4146-2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4146-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-12900
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n51n-m2r7-kbdy
29
url VCID-new8-u5x9-nkeb
vulnerability_id VCID-new8-u5x9-nkeb
summary
A vulnerability in ClamAV could lead to a Denial of Service
    condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1405
reference_id
reference_type
scores
0
value 0.01493
scoring_system epss
scoring_elements 0.81005
published_at 2026-04-01T12:55:00Z
1
value 0.01493
scoring_system epss
scoring_elements 0.81064
published_at 2026-04-08T12:55:00Z
2
value 0.01493
scoring_system epss
scoring_elements 0.81071
published_at 2026-04-09T12:55:00Z
3
value 0.01493
scoring_system epss
scoring_elements 0.81089
published_at 2026-04-11T12:55:00Z
4
value 0.01493
scoring_system epss
scoring_elements 0.81075
published_at 2026-04-12T12:55:00Z
5
value 0.01493
scoring_system epss
scoring_elements 0.81068
published_at 2026-04-13T12:55:00Z
6
value 0.01493
scoring_system epss
scoring_elements 0.81106
published_at 2026-04-16T12:55:00Z
7
value 0.01493
scoring_system epss
scoring_elements 0.81108
published_at 2026-04-18T12:55:00Z
8
value 0.01493
scoring_system epss
scoring_elements 0.81105
published_at 2026-04-21T12:55:00Z
9
value 0.01493
scoring_system epss
scoring_elements 0.81014
published_at 2026-04-02T12:55:00Z
10
value 0.01493
scoring_system epss
scoring_elements 0.81037
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1405
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1405
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622
reference_id 986622
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622
4
reference_url https://security.archlinux.org/AVG-1787
reference_id AVG-1787
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1787
5
reference_url https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html
reference_id clamav-01032-security-patch-release.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:34Z/
url https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html
6
reference_url https://security.gentoo.org/glsa/202104-07
reference_id GLSA-202104-07
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:34Z/
url https://security.gentoo.org/glsa/202104-07
7
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:34Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00012.html
8
reference_url https://usn.ubuntu.com/4918-1/
reference_id USN-4918-1
reference_type
scores
url https://usn.ubuntu.com/4918-1/
9
reference_url https://usn.ubuntu.com/4918-2/
reference_id USN-4918-2
reference_type
scores
url https://usn.ubuntu.com/4918-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2021-1405
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-new8-u5x9-nkeb
30
url VCID-ntvt-zdsj-1fgt
vulnerability_id VCID-ntvt-zdsj-1fgt
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6418
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.59082
published_at 2026-04-18T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.59042
published_at 2026-04-13T12:55:00Z
2
value 0.00373
scoring_system epss
scoring_elements 0.59077
published_at 2026-04-16T12:55:00Z
3
value 0.00373
scoring_system epss
scoring_elements 0.58939
published_at 2026-04-01T12:55:00Z
4
value 0.00373
scoring_system epss
scoring_elements 0.59015
published_at 2026-04-02T12:55:00Z
5
value 0.00373
scoring_system epss
scoring_elements 0.59038
published_at 2026-04-04T12:55:00Z
6
value 0.00373
scoring_system epss
scoring_elements 0.59003
published_at 2026-04-07T12:55:00Z
7
value 0.00373
scoring_system epss
scoring_elements 0.59054
published_at 2026-04-08T12:55:00Z
8
value 0.00373
scoring_system epss
scoring_elements 0.5906
published_at 2026-04-21T12:55:00Z
9
value 0.00373
scoring_system epss
scoring_elements 0.59079
published_at 2026-04-11T12:55:00Z
10
value 0.00373
scoring_system epss
scoring_elements 0.59061
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6418
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6418
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
4
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
5
reference_url https://security.gentoo.org/glsa/201804-16
reference_id GLSA-201804-16
reference_type
scores
url https://security.gentoo.org/glsa/201804-16
6
reference_url https://usn.ubuntu.com/3393-1/
reference_id USN-3393-1
reference_type
scores
url https://usn.ubuntu.com/3393-1/
7
reference_url https://usn.ubuntu.com/3393-2/
reference_id USN-3393-2
reference_type
scores
url https://usn.ubuntu.com/3393-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-6418
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntvt-zdsj-1fgt
31
url VCID-nu3x-4yc8-ufg6
vulnerability_id VCID-nu3x-4yc8-ufg6
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-0361
reference_id
reference_type
scores
0
value 0.00719
scoring_system epss
scoring_elements 0.72486
published_at 2026-04-21T12:55:00Z
1
value 0.00719
scoring_system epss
scoring_elements 0.72451
published_at 2026-04-09T12:55:00Z
2
value 0.00719
scoring_system epss
scoring_elements 0.72474
published_at 2026-04-11T12:55:00Z
3
value 0.00719
scoring_system epss
scoring_elements 0.72456
published_at 2026-04-12T12:55:00Z
4
value 0.00719
scoring_system epss
scoring_elements 0.72446
published_at 2026-04-13T12:55:00Z
5
value 0.00719
scoring_system epss
scoring_elements 0.72488
published_at 2026-04-16T12:55:00Z
6
value 0.00719
scoring_system epss
scoring_elements 0.72497
published_at 2026-04-18T12:55:00Z
7
value 0.00719
scoring_system epss
scoring_elements 0.72399
published_at 2026-04-01T12:55:00Z
8
value 0.00719
scoring_system epss
scoring_elements 0.72404
published_at 2026-04-02T12:55:00Z
9
value 0.00719
scoring_system epss
scoring_elements 0.72422
published_at 2026-04-04T12:55:00Z
10
value 0.00719
scoring_system epss
scoring_elements 0.724
published_at 2026-04-07T12:55:00Z
11
value 0.00719
scoring_system epss
scoring_elements 0.72438
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-0361
1
reference_url https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:27Z/
url https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0361
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:27Z/
url https://lists.debian.org/debian-lts-announce/2018/08/msg00020.html
5
reference_url http://www.securitytracker.com/id/1041367
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:27Z/
url http://www.securitytracker.com/id/1041367
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-0361
reference_id CVE-2018-0361
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-0361
9
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-29T14:37:27Z/
url https://security.gentoo.org/glsa/201904-12
10
reference_url https://usn.ubuntu.com/3722-1/
reference_id USN-3722-1
reference_type
scores
url https://usn.ubuntu.com/3722-1/
11
reference_url https://usn.ubuntu.com/3722-2/
reference_id USN-3722-2
reference_type
scores
url https://usn.ubuntu.com/3722-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2018-0361
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nu3x-4yc8-ufg6
32
url VCID-p5hg-2rdb-z3hq
vulnerability_id VCID-p5hg-2rdb-z3hq
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1788
reference_id
reference_type
scores
0
value 0.09531
scoring_system epss
scoring_elements 0.92862
published_at 2026-04-21T12:55:00Z
1
value 0.09531
scoring_system epss
scoring_elements 0.92827
published_at 2026-04-02T12:55:00Z
2
value 0.09531
scoring_system epss
scoring_elements 0.9283
published_at 2026-04-04T12:55:00Z
3
value 0.09531
scoring_system epss
scoring_elements 0.92829
published_at 2026-04-07T12:55:00Z
4
value 0.09531
scoring_system epss
scoring_elements 0.92838
published_at 2026-04-08T12:55:00Z
5
value 0.09531
scoring_system epss
scoring_elements 0.92841
published_at 2026-04-09T12:55:00Z
6
value 0.09531
scoring_system epss
scoring_elements 0.92846
published_at 2026-04-13T12:55:00Z
7
value 0.09531
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-16T12:55:00Z
8
value 0.09531
scoring_system epss
scoring_elements 0.92857
published_at 2026-04-18T12:55:00Z
9
value 0.09531
scoring_system epss
scoring_elements 0.9282
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1788
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12166
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:54Z/
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12166
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00019.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:54Z/
url https://lists.debian.org/debian-lts-announce/2019/04/msg00019.html
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-1788
reference_id CVE-2019-1788
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-1788
12
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:54Z/
url https://security.gentoo.org/glsa/201904-12
13
reference_url https://usn.ubuntu.com/3940-1/
reference_id USN-3940-1
reference_type
scores
url https://usn.ubuntu.com/3940-1/
14
reference_url https://usn.ubuntu.com/3940-2/
reference_id USN-3940-2
reference_type
scores
url https://usn.ubuntu.com/3940-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-1788
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5hg-2rdb-z3hq
33
url VCID-qacw-bby8-9kdg
vulnerability_id VCID-qacw-bby8-9kdg
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1798
reference_id
reference_type
scores
0
value 0.01577
scoring_system epss
scoring_elements 0.816
published_at 2026-04-21T12:55:00Z
1
value 0.01577
scoring_system epss
scoring_elements 0.81551
published_at 2026-04-08T12:55:00Z
2
value 0.01577
scoring_system epss
scoring_elements 0.81556
published_at 2026-04-09T12:55:00Z
3
value 0.01577
scoring_system epss
scoring_elements 0.81576
published_at 2026-04-11T12:55:00Z
4
value 0.01577
scoring_system epss
scoring_elements 0.81564
published_at 2026-04-12T12:55:00Z
5
value 0.01577
scoring_system epss
scoring_elements 0.81557
published_at 2026-04-13T12:55:00Z
6
value 0.01577
scoring_system epss
scoring_elements 0.81594
published_at 2026-04-16T12:55:00Z
7
value 0.01577
scoring_system epss
scoring_elements 0.81596
published_at 2026-04-18T12:55:00Z
8
value 0.01577
scoring_system epss
scoring_elements 0.81492
published_at 2026-04-01T12:55:00Z
9
value 0.01577
scoring_system epss
scoring_elements 0.81503
published_at 2026-04-02T12:55:00Z
10
value 0.01577
scoring_system epss
scoring_elements 0.81525
published_at 2026-04-04T12:55:00Z
11
value 0.01577
scoring_system epss
scoring_elements 0.81523
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1798
1
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=12262
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:52Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=12262
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1798
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-1798
reference_id CVE-2019-1798
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-1798
6
reference_url https://security.gentoo.org/glsa/201904-12
reference_id GLSA-201904-12
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T17:24:52Z/
url https://security.gentoo.org/glsa/201904-12
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2019-1798
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qacw-bby8-9kdg
34
url VCID-qwwa-mf8k-2fdc
vulnerability_id VCID-qwwa-mf8k-2fdc
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12378
reference_id
reference_type
scores
0
value 0.07706
scoring_system epss
scoring_elements 0.91935
published_at 2026-04-21T12:55:00Z
1
value 0.07706
scoring_system epss
scoring_elements 0.91926
published_at 2026-04-11T12:55:00Z
2
value 0.07706
scoring_system epss
scoring_elements 0.91925
published_at 2026-04-12T12:55:00Z
3
value 0.07706
scoring_system epss
scoring_elements 0.91922
published_at 2026-04-13T12:55:00Z
4
value 0.07706
scoring_system epss
scoring_elements 0.91941
published_at 2026-04-16T12:55:00Z
5
value 0.07706
scoring_system epss
scoring_elements 0.91938
published_at 2026-04-18T12:55:00Z
6
value 0.07706
scoring_system epss
scoring_elements 0.91882
published_at 2026-04-01T12:55:00Z
7
value 0.07706
scoring_system epss
scoring_elements 0.9189
published_at 2026-04-02T12:55:00Z
8
value 0.07706
scoring_system epss
scoring_elements 0.91898
published_at 2026-04-04T12:55:00Z
9
value 0.07706
scoring_system epss
scoring_elements 0.91905
published_at 2026-04-07T12:55:00Z
10
value 0.07706
scoring_system epss
scoring_elements 0.91917
published_at 2026-04-08T12:55:00Z
11
value 0.07706
scoring_system epss
scoring_elements 0.91923
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12378
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12378
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
reference_id 888484
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
4
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
5
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
6
reference_url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
reference_id clamav-0993-has-been-released.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:55:32Z/
url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
7
reference_url https://security.gentoo.org/glsa/201801-19
reference_id GLSA-201801-19
reference_type
scores
url https://security.gentoo.org/glsa/201801-19
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:55:32Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
9
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11946
reference_id show_bug.cgi?id=11946
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:55:32Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11946
10
reference_url https://usn.ubuntu.com/3550-1/
reference_id USN-3550-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:55:32Z/
url https://usn.ubuntu.com/3550-1/
11
reference_url https://usn.ubuntu.com/3550-2/
reference_id USN-3550-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T18:55:32Z/
url https://usn.ubuntu.com/3550-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-12378
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwwa-mf8k-2fdc
35
url VCID-seed-bera-73ez
vulnerability_id VCID-seed-bera-73ez
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12379
reference_id
reference_type
scores
0
value 0.15693
scoring_system epss
scoring_elements 0.94726
published_at 2026-04-21T12:55:00Z
1
value 0.15693
scoring_system epss
scoring_elements 0.94705
published_at 2026-04-11T12:55:00Z
2
value 0.15693
scoring_system epss
scoring_elements 0.94709
published_at 2026-04-12T12:55:00Z
3
value 0.15693
scoring_system epss
scoring_elements 0.9471
published_at 2026-04-13T12:55:00Z
4
value 0.15693
scoring_system epss
scoring_elements 0.94719
published_at 2026-04-16T12:55:00Z
5
value 0.15693
scoring_system epss
scoring_elements 0.94721
published_at 2026-04-18T12:55:00Z
6
value 0.15693
scoring_system epss
scoring_elements 0.94673
published_at 2026-04-01T12:55:00Z
7
value 0.15693
scoring_system epss
scoring_elements 0.94681
published_at 2026-04-02T12:55:00Z
8
value 0.15693
scoring_system epss
scoring_elements 0.94685
published_at 2026-04-04T12:55:00Z
9
value 0.15693
scoring_system epss
scoring_elements 0.94686
published_at 2026-04-07T12:55:00Z
10
value 0.15693
scoring_system epss
scoring_elements 0.94696
published_at 2026-04-08T12:55:00Z
11
value 0.15693
scoring_system epss
scoring_elements 0.94701
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12379
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12379
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
reference_id 888484
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
4
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
5
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
6
reference_url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
reference_id clamav-0993-has-been-released.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:16Z/
url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
7
reference_url https://security.gentoo.org/glsa/201801-19
reference_id GLSA-201801-19
reference_type
scores
url https://security.gentoo.org/glsa/201801-19
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:16Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
9
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11944
reference_id show_bug.cgi?id=11944
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:16Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11944
10
reference_url https://usn.ubuntu.com/3550-1/
reference_id USN-3550-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:16Z/
url https://usn.ubuntu.com/3550-1/
11
reference_url https://usn.ubuntu.com/3550-2/
reference_id USN-3550-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:24:16Z/
url https://usn.ubuntu.com/3550-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-12379
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-seed-bera-73ez
36
url VCID-tzph-y73s-6qb9
vulnerability_id VCID-tzph-y73s-6qb9
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20771
reference_id
reference_type
scores
0
value 0.00983
scoring_system epss
scoring_elements 0.76797
published_at 2026-04-13T12:55:00Z
1
value 0.00983
scoring_system epss
scoring_elements 0.76804
published_at 2026-04-12T12:55:00Z
2
value 0.00983
scoring_system epss
scoring_elements 0.76824
published_at 2026-04-11T12:55:00Z
3
value 0.00983
scoring_system epss
scoring_elements 0.76836
published_at 2026-04-21T12:55:00Z
4
value 0.00983
scoring_system epss
scoring_elements 0.76845
published_at 2026-04-18T12:55:00Z
5
value 0.00983
scoring_system epss
scoring_elements 0.76839
published_at 2026-04-16T12:55:00Z
6
value 0.0101
scoring_system epss
scoring_elements 0.77057
published_at 2026-04-07T12:55:00Z
7
value 0.0101
scoring_system epss
scoring_elements 0.77047
published_at 2026-04-02T12:55:00Z
8
value 0.0101
scoring_system epss
scoring_elements 0.77089
published_at 2026-04-08T12:55:00Z
9
value 0.0101
scoring_system epss
scoring_elements 0.77076
published_at 2026-04-04T12:55:00Z
10
value 0.0101
scoring_system epss
scoring_elements 0.77099
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20771
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20771
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
reference_id 7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
4
reference_url https://security.archlinux.org/AVG-2722
reference_id AVG-2722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2722
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
reference_id BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
6
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG
reference_id cisco-sa-clamav-dos-ZAZBwRVG
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:31Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG
7
reference_url https://security.gentoo.org/glsa/202310-01
reference_id GLSA-202310-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:31Z/
url https://security.gentoo.org/glsa/202310-01
8
reference_url https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:31Z/
url https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
reference_id N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:01:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
10
reference_url https://usn.ubuntu.com/5423-1/
reference_id USN-5423-1
reference_type
scores
url https://usn.ubuntu.com/5423-1/
11
reference_url https://usn.ubuntu.com/5423-2/
reference_id USN-5423-2
reference_type
scores
url https://usn.ubuntu.com/5423-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
1
vulnerability VCID-63vt-1nc8-6kfc
2
vulnerability VCID-ggz7-h35v-p7ep
3
vulnerability VCID-vdhk-r67a-s3fr
4
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1
aliases CVE-2022-20771
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tzph-y73s-6qb9
37
url VCID-u3pj-kant-effb
vulnerability_id VCID-u3pj-kant-effb
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-3123
reference_id
reference_type
scores
0
value 0.02399
scoring_system epss
scoring_elements 0.84973
published_at 2026-04-01T12:55:00Z
1
value 0.02399
scoring_system epss
scoring_elements 0.84987
published_at 2026-04-02T12:55:00Z
2
value 0.02399
scoring_system epss
scoring_elements 0.85004
published_at 2026-04-04T12:55:00Z
3
value 0.02399
scoring_system epss
scoring_elements 0.85009
published_at 2026-04-07T12:55:00Z
4
value 0.02399
scoring_system epss
scoring_elements 0.85031
published_at 2026-04-08T12:55:00Z
5
value 0.02399
scoring_system epss
scoring_elements 0.85038
published_at 2026-04-09T12:55:00Z
6
value 0.02399
scoring_system epss
scoring_elements 0.85054
published_at 2026-04-11T12:55:00Z
7
value 0.02399
scoring_system epss
scoring_elements 0.85053
published_at 2026-04-12T12:55:00Z
8
value 0.02399
scoring_system epss
scoring_elements 0.85049
published_at 2026-04-13T12:55:00Z
9
value 0.02399
scoring_system epss
scoring_elements 0.8507
published_at 2026-04-21T12:55:00Z
10
value 0.02399
scoring_system epss
scoring_elements 0.85072
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-3123
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3123
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950944
reference_id 950944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950944
3
reference_url https://security.archlinux.org/AVG-1168
reference_id AVG-1168
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1168
4
reference_url https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html
reference_id clamav-01022-security-patch-released.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:29Z/
url https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html
5
reference_url https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062
reference_id CSCvs59062
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:29Z/
url https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062
6
reference_url https://security.gentoo.org/glsa/202003-46
reference_id GLSA-202003-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:29Z/
url https://security.gentoo.org/glsa/202003-46
7
reference_url https://usn.ubuntu.com/4280-1/
reference_id USN-4280-1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:29Z/
url https://usn.ubuntu.com/4280-1/
8
reference_url https://usn.ubuntu.com/4280-2/
reference_id USN-4280-2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:22:29Z/
url https://usn.ubuntu.com/4280-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
purl pkg:deb/debian/clamav@0.102.3%2Bdfsg-0~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-cc9p-w184-zfej
4
vulnerability VCID-cysq-fdzg-13dd
5
vulnerability VCID-d3u3-epeb-guh9
6
vulnerability VCID-dn26-zfsc-ryec
7
vulnerability VCID-egd5-p68y-wfdy
8
vulnerability VCID-fp31-7krz-abbs
9
vulnerability VCID-ggz7-h35v-p7ep
10
vulnerability VCID-kurn-1uay-qqap
11
vulnerability VCID-mdfk-5ked-t3bu
12
vulnerability VCID-mu6w-nub4-z3ef
13
vulnerability VCID-new8-u5x9-nkeb
14
vulnerability VCID-tzph-y73s-6qb9
15
vulnerability VCID-vbmy-urt6-myha
16
vulnerability VCID-vdhk-r67a-s3fr
17
vulnerability VCID-wjvc-p75d-p3a9
18
vulnerability VCID-xfzw-afgg-fqdc
19
vulnerability VCID-xwgq-w8k4-xbcn
20
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.102.3%252Bdfsg-0~deb9u1
aliases CVE-2020-3123
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u3pj-kant-effb
38
url VCID-u4qp-vcnh-c3dd
vulnerability_id VCID-u4qp-vcnh-c3dd
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12374
reference_id
reference_type
scores
0
value 0.07329
scoring_system epss
scoring_elements 0.9171
published_at 2026-04-21T12:55:00Z
1
value 0.07329
scoring_system epss
scoring_elements 0.91697
published_at 2026-04-11T12:55:00Z
2
value 0.07329
scoring_system epss
scoring_elements 0.91699
published_at 2026-04-12T12:55:00Z
3
value 0.07329
scoring_system epss
scoring_elements 0.91696
published_at 2026-04-13T12:55:00Z
4
value 0.07329
scoring_system epss
scoring_elements 0.91717
published_at 2026-04-16T12:55:00Z
5
value 0.07329
scoring_system epss
scoring_elements 0.91709
published_at 2026-04-18T12:55:00Z
6
value 0.07329
scoring_system epss
scoring_elements 0.91652
published_at 2026-04-01T12:55:00Z
7
value 0.07329
scoring_system epss
scoring_elements 0.9166
published_at 2026-04-02T12:55:00Z
8
value 0.07329
scoring_system epss
scoring_elements 0.91666
published_at 2026-04-04T12:55:00Z
9
value 0.07329
scoring_system epss
scoring_elements 0.91675
published_at 2026-04-07T12:55:00Z
10
value 0.07329
scoring_system epss
scoring_elements 0.91687
published_at 2026-04-08T12:55:00Z
11
value 0.07329
scoring_system epss
scoring_elements 0.91694
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12374
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12374
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
reference_id 888484
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
4
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
5
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
6
reference_url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
reference_id clamav-0993-has-been-released.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:39Z/
url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
7
reference_url https://security.gentoo.org/glsa/201801-19
reference_id GLSA-201801-19
reference_type
scores
url https://security.gentoo.org/glsa/201801-19
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:39Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
9
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11939
reference_id show_bug.cgi?id=11939
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:39Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11939
10
reference_url https://usn.ubuntu.com/3550-1/
reference_id USN-3550-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:39Z/
url https://usn.ubuntu.com/3550-1/
11
reference_url https://usn.ubuntu.com/3550-2/
reference_id USN-3550-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:39Z/
url https://usn.ubuntu.com/3550-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-12374
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4qp-vcnh-c3dd
39
url VCID-vbmy-urt6-myha
vulnerability_id VCID-vbmy-urt6-myha
summary A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-3341
reference_id
reference_type
scores
0
value 0.04089
scoring_system epss
scoring_elements 0.88522
published_at 2026-04-01T12:55:00Z
1
value 0.04089
scoring_system epss
scoring_elements 0.8853
published_at 2026-04-02T12:55:00Z
2
value 0.04089
scoring_system epss
scoring_elements 0.88547
published_at 2026-04-04T12:55:00Z
3
value 0.04089
scoring_system epss
scoring_elements 0.88551
published_at 2026-04-07T12:55:00Z
4
value 0.04089
scoring_system epss
scoring_elements 0.88569
published_at 2026-04-08T12:55:00Z
5
value 0.04089
scoring_system epss
scoring_elements 0.88574
published_at 2026-04-09T12:55:00Z
6
value 0.04089
scoring_system epss
scoring_elements 0.88586
published_at 2026-04-21T12:55:00Z
7
value 0.04089
scoring_system epss
scoring_elements 0.88578
published_at 2026-04-12T12:55:00Z
8
value 0.04089
scoring_system epss
scoring_elements 0.88579
published_at 2026-04-13T12:55:00Z
9
value 0.04089
scoring_system epss
scoring_elements 0.88592
published_at 2026-04-16T12:55:00Z
10
value 0.04089
scoring_system epss
scoring_elements 0.88588
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-3341
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/
reference_id 3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/
4
reference_url https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
reference_id clamav-01023-security-patch-released.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/
url https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/
reference_id L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/
6
reference_url https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/
url https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/
reference_id ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/
8
reference_url https://usn.ubuntu.com/4370-1/
reference_id USN-4370-1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/
url https://usn.ubuntu.com/4370-1/
9
reference_url https://usn.ubuntu.com/4370-2/
reference_id USN-4370-2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/
url https://usn.ubuntu.com/4370-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2020-3341
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbmy-urt6-myha
40
url VCID-vdhk-r67a-s3fr
vulnerability_id VCID-vdhk-r67a-s3fr
summary A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20128
reference_id
reference_type
scores
0
value 0.01581
scoring_system epss
scoring_elements 0.8162
published_at 2026-04-21T12:55:00Z
1
value 0.01581
scoring_system epss
scoring_elements 0.81617
published_at 2026-04-18T12:55:00Z
2
value 0.01581
scoring_system epss
scoring_elements 0.81585
published_at 2026-04-12T12:55:00Z
3
value 0.01581
scoring_system epss
scoring_elements 0.81616
published_at 2026-04-16T12:55:00Z
4
value 0.01581
scoring_system epss
scoring_elements 0.81598
published_at 2026-04-11T12:55:00Z
5
value 0.01581
scoring_system epss
scoring_elements 0.81578
published_at 2026-04-13T12:55:00Z
6
value 0.01625
scoring_system epss
scoring_elements 0.81845
published_at 2026-04-08T12:55:00Z
7
value 0.01625
scoring_system epss
scoring_elements 0.81799
published_at 2026-04-02T12:55:00Z
8
value 0.01625
scoring_system epss
scoring_elements 0.81822
published_at 2026-04-04T12:55:00Z
9
value 0.01625
scoring_system epss
scoring_elements 0.81819
published_at 2026-04-07T12:55:00Z
10
value 0.01625
scoring_system epss
scoring_elements 0.81852
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20128
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20128
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093880
reference_id 1093880
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093880
4
reference_url https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
reference_id cisco-sa-clamav-ole2-H549rphA
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T16:54:39Z/
url https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
5
reference_url https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
reference_id clamav-142-and-108-security-patch.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T16:54:39Z/
url https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
6
reference_url https://usn.ubuntu.com/7229-1/
reference_id USN-7229-1
reference_type
scores
url https://usn.ubuntu.com/7229-1/
fixed_packages
0
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1~deb12u2
aliases CVE-2025-20128
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdhk-r67a-s3fr
41
url VCID-vqyc-hxfb-ufav
vulnerability_id VCID-vqyc-hxfb-ufav
summary ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted 7z file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1372
reference_id
reference_type
scores
0
value 0.00515
scoring_system epss
scoring_elements 0.66626
published_at 2026-04-21T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66521
published_at 2026-04-01T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.6656
published_at 2026-04-02T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66585
published_at 2026-04-04T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.66557
published_at 2026-04-07T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.66605
published_at 2026-04-08T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66618
published_at 2026-04-09T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66636
published_at 2026-04-11T12:55:00Z
8
value 0.00515
scoring_system epss
scoring_elements 0.66624
published_at 2026-04-12T12:55:00Z
9
value 0.00515
scoring_system epss
scoring_elements 0.66591
published_at 2026-04-13T12:55:00Z
10
value 0.00515
scoring_system epss
scoring_elements 0.66627
published_at 2026-04-16T12:55:00Z
11
value 0.00515
scoring_system epss
scoring_elements 0.66642
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1372
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1372
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/3093-1/
reference_id USN-3093-1
reference_type
scores
url https://usn.ubuntu.com/3093-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2016-1372
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyc-hxfb-ufav
42
url VCID-wjvc-p75d-p3a9
vulnerability_id VCID-wjvc-p75d-p3a9
summary Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20506
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10881
published_at 2026-04-21T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10883
published_at 2026-04-13T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10742
published_at 2026-04-16T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10755
published_at 2026-04-18T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10918
published_at 2026-04-02T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10982
published_at 2026-04-04T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10808
published_at 2026-04-07T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10884
published_at 2026-04-08T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10937
published_at 2026-04-09T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10938
published_at 2026-04-11T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10905
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20506
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20506
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080962
reference_id 1080962
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080962
4
reference_url https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html
reference_id clamav-141-132-107-and-010312-security.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T13:34:43Z/
url https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html
5
reference_url https://security.gentoo.org/glsa/202507-03
reference_id GLSA-202507-03
reference_type
scores
url https://security.gentoo.org/glsa/202507-03
6
reference_url https://usn.ubuntu.com/7011-1/
reference_id USN-7011-1
reference_type
scores
url https://usn.ubuntu.com/7011-1/
7
reference_url https://usn.ubuntu.com/7011-2/
reference_id USN-7011-2
reference_type
scores
url https://usn.ubuntu.com/7011-2/
fixed_packages
0
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1~deb12u2
aliases CVE-2024-20506
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjvc-p75d-p3a9
43
url VCID-xfzw-afgg-fqdc
vulnerability_id VCID-xfzw-afgg-fqdc
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-3481
reference_id
reference_type
scores
0
value 0.02963
scoring_system epss
scoring_elements 0.86421
published_at 2026-04-01T12:55:00Z
1
value 0.02963
scoring_system epss
scoring_elements 0.86432
published_at 2026-04-02T12:55:00Z
2
value 0.02963
scoring_system epss
scoring_elements 0.86451
published_at 2026-04-07T12:55:00Z
3
value 0.02963
scoring_system epss
scoring_elements 0.8647
published_at 2026-04-08T12:55:00Z
4
value 0.02963
scoring_system epss
scoring_elements 0.8648
published_at 2026-04-09T12:55:00Z
5
value 0.02963
scoring_system epss
scoring_elements 0.86495
published_at 2026-04-11T12:55:00Z
6
value 0.02963
scoring_system epss
scoring_elements 0.86492
published_at 2026-04-12T12:55:00Z
7
value 0.02963
scoring_system epss
scoring_elements 0.86487
published_at 2026-04-13T12:55:00Z
8
value 0.02963
scoring_system epss
scoring_elements 0.86502
published_at 2026-04-16T12:55:00Z
9
value 0.02963
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-18T12:55:00Z
10
value 0.02963
scoring_system epss
scoring_elements 0.865
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-3481
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3481
2
reference_url https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html
reference_id clamav-01024-security-patch-released.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T17:13:21Z/
url https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html
3
reference_url https://security.gentoo.org/glsa/202007-23
reference_id GLSA-202007-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T17:13:21Z/
url https://security.gentoo.org/glsa/202007-23
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
reference_id IJ67VH37NCG25PICGWFWZHSVG7PBT7MC
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T17:13:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
5
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T17:13:21Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
reference_id QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T17:13:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
7
reference_url https://usn.ubuntu.com/4435-1/
reference_id USN-4435-1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T17:13:21Z/
url https://usn.ubuntu.com/4435-1/
8
reference_url https://usn.ubuntu.com/4435-2/
reference_id USN-4435-2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T17:13:21Z/
url https://usn.ubuntu.com/4435-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2020-3481
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfzw-afgg-fqdc
44
url VCID-xwgq-w8k4-xbcn
vulnerability_id VCID-xwgq-w8k4-xbcn
summary A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1252
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-21T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.67623
published_at 2026-04-12T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.6759
published_at 2026-04-13T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67625
published_at 2026-04-16T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67514
published_at 2026-04-01T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.6755
published_at 2026-04-02T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.67571
published_at 2026-04-04T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67549
published_at 2026-04-07T12:55:00Z
8
value 0.00539
scoring_system epss
scoring_elements 0.676
published_at 2026-04-08T12:55:00Z
9
value 0.00539
scoring_system epss
scoring_elements 0.67614
published_at 2026-04-09T12:55:00Z
10
value 0.00539
scoring_system epss
scoring_elements 0.67637
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1252
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1252
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622
reference_id 986622
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622
4
reference_url https://security.archlinux.org/AVG-1787
reference_id AVG-1787
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1787
5
reference_url https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html
reference_id clamav-01032-security-patch-release.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:36Z/
url https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html
6
reference_url https://usn.ubuntu.com/4918-1/
reference_id USN-4918-1
reference_type
scores
url https://usn.ubuntu.com/4918-1/
7
reference_url https://usn.ubuntu.com/4918-2/
reference_id USN-4918-2
reference_type
scores
url https://usn.ubuntu.com/4918-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2021-1252
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwgq-w8k4-xbcn
45
url VCID-y3k7-e14w-xqbn
vulnerability_id VCID-y3k7-e14w-xqbn
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12375
reference_id
reference_type
scores
0
value 0.09673
scoring_system epss
scoring_elements 0.92926
published_at 2026-04-21T12:55:00Z
1
value 0.09673
scoring_system epss
scoring_elements 0.92909
published_at 2026-04-11T12:55:00Z
2
value 0.09673
scoring_system epss
scoring_elements 0.92907
published_at 2026-04-12T12:55:00Z
3
value 0.09673
scoring_system epss
scoring_elements 0.92908
published_at 2026-04-13T12:55:00Z
4
value 0.09673
scoring_system epss
scoring_elements 0.92918
published_at 2026-04-16T12:55:00Z
5
value 0.09673
scoring_system epss
scoring_elements 0.92921
published_at 2026-04-18T12:55:00Z
6
value 0.09673
scoring_system epss
scoring_elements 0.92881
published_at 2026-04-01T12:55:00Z
7
value 0.09673
scoring_system epss
scoring_elements 0.92889
published_at 2026-04-02T12:55:00Z
8
value 0.09673
scoring_system epss
scoring_elements 0.92894
published_at 2026-04-04T12:55:00Z
9
value 0.09673
scoring_system epss
scoring_elements 0.92892
published_at 2026-04-07T12:55:00Z
10
value 0.09673
scoring_system epss
scoring_elements 0.929
published_at 2026-04-08T12:55:00Z
11
value 0.09673
scoring_system epss
scoring_elements 0.92904
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12375
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12375
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
reference_id 888484
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
4
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
5
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
6
reference_url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
reference_id clamav-0993-has-been-released.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:38Z/
url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
7
reference_url https://security.gentoo.org/glsa/201801-19
reference_id GLSA-201801-19
reference_type
scores
url https://security.gentoo.org/glsa/201801-19
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:38Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
9
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11940
reference_id show_bug.cgi?id=11940
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:38Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11940
10
reference_url https://usn.ubuntu.com/3550-1/
reference_id USN-3550-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:38Z/
url https://usn.ubuntu.com/3550-1/
11
reference_url https://usn.ubuntu.com/3550-2/
reference_id USN-3550-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:38Z/
url https://usn.ubuntu.com/3550-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-12375
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3k7-e14w-xqbn
46
url VCID-y5mg-rpf8-cbe7
vulnerability_id VCID-y5mg-rpf8-cbe7
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11423.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11423
reference_id
reference_type
scores
0
value 0.02813
scoring_system epss
scoring_elements 0.86153
published_at 2026-04-21T12:55:00Z
1
value 0.02813
scoring_system epss
scoring_elements 0.86161
published_at 2026-04-18T12:55:00Z
2
value 0.03047
scoring_system epss
scoring_elements 0.86701
published_at 2026-04-16T12:55:00Z
3
value 0.03047
scoring_system epss
scoring_elements 0.86688
published_at 2026-04-13T12:55:00Z
4
value 0.03047
scoring_system epss
scoring_elements 0.86625
published_at 2026-04-01T12:55:00Z
5
value 0.03047
scoring_system epss
scoring_elements 0.86636
published_at 2026-04-02T12:55:00Z
6
value 0.03047
scoring_system epss
scoring_elements 0.86655
published_at 2026-04-07T12:55:00Z
7
value 0.03047
scoring_system epss
scoring_elements 0.86674
published_at 2026-04-08T12:55:00Z
8
value 0.03047
scoring_system epss
scoring_elements 0.86684
published_at 2026-04-09T12:55:00Z
9
value 0.03047
scoring_system epss
scoring_elements 0.86697
published_at 2026-04-11T12:55:00Z
10
value 0.03047
scoring_system epss
scoring_elements 0.86694
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472776
reference_id 1472776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472776
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868956
reference_id 868956
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868956
7
reference_url https://security.archlinux.org/ASA-201802-9
reference_id ASA-201802-9
reference_type
scores
url https://security.archlinux.org/ASA-201802-9
8
reference_url https://security.archlinux.org/ASA-201803-14
reference_id ASA-201803-14
reference_type
scores
url https://security.archlinux.org/ASA-201803-14
9
reference_url https://security.archlinux.org/AVG-602
reference_id AVG-602
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-602
10
reference_url https://security.archlinux.org/AVG-603
reference_id AVG-603
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-603
11
reference_url https://security.gentoo.org/glsa/201804-16
reference_id GLSA-201804-16
reference_type
scores
url https://security.gentoo.org/glsa/201804-16
12
reference_url https://usn.ubuntu.com/3394-1/
reference_id USN-3394-1
reference_type
scores
url https://usn.ubuntu.com/3394-1/
13
reference_url https://usn.ubuntu.com/7788-1/
reference_id USN-7788-1
reference_type
scores
url https://usn.ubuntu.com/7788-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-11423
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5mg-rpf8-cbe7
47
url VCID-zbkr-bd4m-77cs
vulnerability_id VCID-zbkr-bd4m-77cs
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12380
reference_id
reference_type
scores
0
value 0.13224
scoring_system epss
scoring_elements 0.94164
published_at 2026-04-21T12:55:00Z
1
value 0.13224
scoring_system epss
scoring_elements 0.94139
published_at 2026-04-09T12:55:00Z
2
value 0.13224
scoring_system epss
scoring_elements 0.94143
published_at 2026-04-11T12:55:00Z
3
value 0.13224
scoring_system epss
scoring_elements 0.94144
published_at 2026-04-13T12:55:00Z
4
value 0.13224
scoring_system epss
scoring_elements 0.9416
published_at 2026-04-16T12:55:00Z
5
value 0.13224
scoring_system epss
scoring_elements 0.94165
published_at 2026-04-18T12:55:00Z
6
value 0.13224
scoring_system epss
scoring_elements 0.94101
published_at 2026-04-01T12:55:00Z
7
value 0.13224
scoring_system epss
scoring_elements 0.94111
published_at 2026-04-02T12:55:00Z
8
value 0.13224
scoring_system epss
scoring_elements 0.94122
published_at 2026-04-04T12:55:00Z
9
value 0.13224
scoring_system epss
scoring_elements 0.94126
published_at 2026-04-07T12:55:00Z
10
value 0.13224
scoring_system epss
scoring_elements 0.94135
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12380
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12380
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
reference_id 888484
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
4
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
5
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
6
reference_url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
reference_id clamav-0993-has-been-released.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:35Z/
url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
7
reference_url https://security.gentoo.org/glsa/201801-19
reference_id GLSA-201801-19
reference_type
scores
url https://security.gentoo.org/glsa/201801-19
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:35Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
9
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11945
reference_id show_bug.cgi?id=11945
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:35Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11945
10
reference_url https://usn.ubuntu.com/3550-1/
reference_id USN-3550-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:35Z/
url https://usn.ubuntu.com/3550-1/
11
reference_url https://usn.ubuntu.com/3550-2/
reference_id USN-3550-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-02T19:11:35Z/
url https://usn.ubuntu.com/3550-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-12380
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbkr-bd4m-77cs
48
url VCID-zeub-1qhs-pyfh
vulnerability_id VCID-zeub-1qhs-pyfh
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-3350
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32519
published_at 2026-04-01T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32668
published_at 2026-04-02T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32703
published_at 2026-04-04T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32524
published_at 2026-04-07T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32571
published_at 2026-04-16T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32598
published_at 2026-04-09T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32599
published_at 2026-04-11T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32562
published_at 2026-04-12T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32535
published_at 2026-04-13T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.3255
published_at 2026-04-18T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32517
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-3350
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3350
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-famp-ZEpdXy
reference_id cisco-sa-famp-ZEpdXy
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:27:39Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-famp-ZEpdXy
4
reference_url https://security.gentoo.org/glsa/202007-23
reference_id GLSA-202007-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:27:39Z/
url https://security.gentoo.org/glsa/202007-23
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
reference_id IJ67VH37NCG25PICGWFWZHSVG7PBT7MC
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:27:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
6
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:27:39Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
reference_id QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:27:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
8
reference_url https://usn.ubuntu.com/4435-1/
reference_id USN-4435-1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:27:39Z/
url https://usn.ubuntu.com/4435-1/
9
reference_url https://usn.ubuntu.com/4435-2/
reference_id USN-4435-2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:27:39Z/
url https://usn.ubuntu.com/4435-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
purl pkg:deb/debian/clamav@0.103.6%2Bdfsg-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2aju-u36p-gug9
1
vulnerability VCID-4z4r-2w8m-r7dz
2
vulnerability VCID-63vt-1nc8-6kfc
3
vulnerability VCID-d3u3-epeb-guh9
4
vulnerability VCID-dn26-zfsc-ryec
5
vulnerability VCID-fp31-7krz-abbs
6
vulnerability VCID-ggz7-h35v-p7ep
7
vulnerability VCID-kurn-1uay-qqap
8
vulnerability VCID-mdfk-5ked-t3bu
9
vulnerability VCID-tzph-y73s-6qb9
10
vulnerability VCID-vdhk-r67a-s3fr
11
vulnerability VCID-wjvc-p75d-p3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.6%252Bdfsg-0%252Bdeb10u1
aliases CVE-2020-3350
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zeub-1qhs-pyfh
49
url VCID-zys1-2pnp-h3an
vulnerability_id VCID-zys1-2pnp-h3an
summary
Multiple vulnerabilities have been found in ClamAV, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12376
reference_id
reference_type
scores
0
value 0.17824
scoring_system epss
scoring_elements 0.95146
published_at 2026-04-21T12:55:00Z
1
value 0.17824
scoring_system epss
scoring_elements 0.95128
published_at 2026-04-11T12:55:00Z
2
value 0.17824
scoring_system epss
scoring_elements 0.9513
published_at 2026-04-12T12:55:00Z
3
value 0.17824
scoring_system epss
scoring_elements 0.95133
published_at 2026-04-13T12:55:00Z
4
value 0.17824
scoring_system epss
scoring_elements 0.95141
published_at 2026-04-16T12:55:00Z
5
value 0.17824
scoring_system epss
scoring_elements 0.95144
published_at 2026-04-18T12:55:00Z
6
value 0.17824
scoring_system epss
scoring_elements 0.95096
published_at 2026-04-01T12:55:00Z
7
value 0.17824
scoring_system epss
scoring_elements 0.95107
published_at 2026-04-02T12:55:00Z
8
value 0.17824
scoring_system epss
scoring_elements 0.95109
published_at 2026-04-04T12:55:00Z
9
value 0.17824
scoring_system epss
scoring_elements 0.95111
published_at 2026-04-07T12:55:00Z
10
value 0.17824
scoring_system epss
scoring_elements 0.95118
published_at 2026-04-08T12:55:00Z
11
value 0.17824
scoring_system epss
scoring_elements 0.95122
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12376
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12376
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
reference_id 888484
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888484
4
reference_url https://security.archlinux.org/ASA-201802-1
reference_id ASA-201802-1
reference_type
scores
url https://security.archlinux.org/ASA-201802-1
5
reference_url https://security.archlinux.org/AVG-601
reference_id AVG-601
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-601
6
reference_url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
reference_id clamav-0993-has-been-released.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:09:02Z/
url http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
7
reference_url https://security.gentoo.org/glsa/201801-19
reference_id GLSA-201801-19
reference_type
scores
url https://security.gentoo.org/glsa/201801-19
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:09:02Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
9
reference_url https://bugzilla.clamav.net/show_bug.cgi?id=11942
reference_id show_bug.cgi?id=11942
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:09:02Z/
url https://bugzilla.clamav.net/show_bug.cgi?id=11942
10
reference_url https://usn.ubuntu.com/3550-1/
reference_id USN-3550-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:09:02Z/
url https://usn.ubuntu.com/3550-1/
11
reference_url https://usn.ubuntu.com/3550-2/
reference_id USN-3550-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-02T19:09:02Z/
url https://usn.ubuntu.com/3550-2/
fixed_packages
0
url pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
purl pkg:deb/debian/clamav@0.100.0%2Bdfsg-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1346-uavy-pbdb
1
vulnerability VCID-2aju-u36p-gug9
2
vulnerability VCID-32nc-x9aw-a3fb
3
vulnerability VCID-4z4r-2w8m-r7dz
4
vulnerability VCID-5hnm-hz17-2bey
5
vulnerability VCID-63vt-1nc8-6kfc
6
vulnerability VCID-7dcd-v8q9-b3bv
7
vulnerability VCID-8s2g-2brb-tfhq
8
vulnerability VCID-a4nz-5cr8-13an
9
vulnerability VCID-cc9p-w184-zfej
10
vulnerability VCID-cysq-fdzg-13dd
11
vulnerability VCID-d3u3-epeb-guh9
12
vulnerability VCID-dn26-zfsc-ryec
13
vulnerability VCID-egd5-p68y-wfdy
14
vulnerability VCID-fp31-7krz-abbs
15
vulnerability VCID-ggz7-h35v-p7ep
16
vulnerability VCID-h46v-x33x-t3ep
17
vulnerability VCID-kurn-1uay-qqap
18
vulnerability VCID-mdfk-5ked-t3bu
19
vulnerability VCID-mu6w-nub4-z3ef
20
vulnerability VCID-mufb-kvfq-mubz
21
vulnerability VCID-n51n-m2r7-kbdy
22
vulnerability VCID-new8-u5x9-nkeb
23
vulnerability VCID-nu3x-4yc8-ufg6
24
vulnerability VCID-p5hg-2rdb-z3hq
25
vulnerability VCID-qacw-bby8-9kdg
26
vulnerability VCID-tzph-y73s-6qb9
27
vulnerability VCID-u3pj-kant-effb
28
vulnerability VCID-vbmy-urt6-myha
29
vulnerability VCID-vdhk-r67a-s3fr
30
vulnerability VCID-wjvc-p75d-p3a9
31
vulnerability VCID-xfzw-afgg-fqdc
32
vulnerability VCID-xwgq-w8k4-xbcn
33
vulnerability VCID-zeub-1qhs-pyfh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.100.0%252Bdfsg-0%252Bdeb8u1
aliases CVE-2017-12376
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zys1-2pnp-h3an
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.99%252Bdfsg-0%252Bdeb7u2