| 0 |
| url |
VCID-568z-e7ep-dbdz |
| vulnerability_id |
VCID-568z-e7ep-dbdz |
| summary |
Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-20803 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82309 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82256 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82264 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82283 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82277 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82271 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82307 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.82235 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.01696 |
| scoring_system |
epss |
| scoring_elements |
0.8223 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-20803 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-20803
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-568z-e7ep-dbdz |
|
| 1 |
| url |
VCID-fg72-nbqy-mqgs |
| vulnerability_id |
VCID-fg72-nbqy-mqgs |
| summary |
freshclam in ClamAV in Apple Mac OS X 10.5.8 with Security Update 2009-005 has an incorrect launchd.plist ProgramArguments key and consequently does not run, which might allow remote attackers to introduce viruses into the system. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0058 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69326 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69355 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69335 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69401 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69408 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69394 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69434 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69444 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69426 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0058 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0058
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fg72-nbqy-mqgs |
|
| 2 |
| url |
VCID-jcfy-dyqj-h3aw |
| vulnerability_id |
VCID-jcfy-dyqj-h3aw |
| summary |
A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.
For a description of this vulnerability, see the . |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-20234 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50789 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50805 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50863 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50886 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50844 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50846 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.50831 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00706 |
| scoring_system |
epss |
| scoring_elements |
0.72161 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00706 |
| scoring_system |
epss |
| scoring_elements |
0.72168 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00706 |
| scoring_system |
epss |
| scoring_elements |
0.72176 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-20234 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-20234
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jcfy-dyqj-h3aw |
|
| 3 |
| url |
VCID-jdn6-r2vx-6fbh |
| vulnerability_id |
VCID-jdn6-r2vx-6fbh |
| summary |
Unspecified vulnerability in libclamav/phishcheck.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1, when running on Solaris, allows remote attackers to cause a denial of service (hang) via unknown vectors related to the isURL function and regular expressions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3025 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74443 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74361 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74365 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74392 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74367 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74399 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74415 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74436 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74416 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74407 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74445 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00821 |
| scoring_system |
epss |
| scoring_elements |
0.74453 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3025 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3025
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jdn6-r2vx-6fbh |
|
| 4 |
| url |
VCID-k4w5-5g16-x3b2 |
| vulnerability_id |
VCID-k4w5-5g16-x3b2 |
| summary |
Multiple vulnerabilities in ClamAV may result in the remote execution of
arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1835 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85231 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85243 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85262 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85264 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85286 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85294 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85309 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85307 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85303 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85323 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85325 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02486 |
| scoring_system |
epss |
| scoring_elements |
0.85321 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1835 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1835
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k4w5-5g16-x3b2 |
|
| 5 |
| url |
VCID-p14n-mfwj-vufs |
| vulnerability_id |
VCID-p14n-mfwj-vufs |
| summary |
Multiple vulnerabilities in ClamAV may result in the remote execution of
arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1836 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90511 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90515 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90526 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90532 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90551 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90559 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.9057 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90569 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.05852 |
| scoring_system |
epss |
| scoring_elements |
0.90568 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1836 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1836
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p14n-mfwj-vufs |
|
| 6 |
| url |
VCID-rhj5-gtyt-2ucn |
| vulnerability_id |
VCID-rhj5-gtyt-2ucn |
| summary |
A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-20380 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65988 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65951 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65986 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.66 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65916 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65946 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65912 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65964 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65976 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65994 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65981 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-20380 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-20380
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhj5-gtyt-2ucn |
|
| 7 |
| url |
VCID-sq4f-krz1-87fw |
| vulnerability_id |
VCID-sq4f-krz1-87fw |
| summary |
Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-20290 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92429 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92393 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92404 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92409 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92415 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92417 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92427 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92426 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92382 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.08586 |
| scoring_system |
epss |
| scoring_elements |
0.92389 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-20290 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-20290
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sq4f-krz1-87fw |
|
| 8 |
| url |
VCID-u4q5-6h15-guf2 |
| vulnerability_id |
VCID-u4q5-6h15-guf2 |
| summary |
Multiple interpretation error in unspecified versions of ClamAV Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53588 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53486 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.5351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53535 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53503 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53553 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.5355 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53599 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53564 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.536 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53605 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3229 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3229
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u4q5-6h15-guf2 |
|
| 9 |
| url |
VCID-uvbv-aeft-jyay |
| vulnerability_id |
VCID-uvbv-aeft-jyay |
| summary |
Multiple vulnerabilities in ClamAV may result in the remote execution of
arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1837 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93005 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93013 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93017 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93016 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93024 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93029 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93034 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93031 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93033 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93043 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93046 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.09954 |
| scoring_system |
epss |
| scoring_elements |
0.93053 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1837 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1837
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uvbv-aeft-jyay |
|
| 10 |
| url |
VCID-vhv6-2yu5-wbb3 |
| vulnerability_id |
VCID-vhv6-2yu5-wbb3 |
| summary |
freshclam in (1) Clam Antivirus (ClamAV) 0.88 and (2) ClamXav 1.0.3h and earlier does not drop privileges before processing the config-file command line option, which allows local users to read portions of arbitrary files when an error message displays the first line of the target file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-2427 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14582 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14631 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14702 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14603 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.1466 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14619 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14581 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14521 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14412 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14414 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14486 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-2427 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-2427
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vhv6-2yu5-wbb3 |
|
| 11 |
| url |
VCID-vzhw-bgs7-sye3 |
| vulnerability_id |
VCID-vzhw-bgs7-sye3 |
| summary |
Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-20212 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76433 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76461 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76443 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76476 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.7649 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76515 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76494 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76489 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.7653 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76533 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00961 |
| scoring_system |
epss |
| scoring_elements |
0.76522 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-20212 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-20212
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vzhw-bgs7-sye3 |
|
| 12 |
| url |
VCID-xyb8-pe6q-sbby |
| vulnerability_id |
VCID-xyb8-pe6q-sbby |
| summary |
The Ubuntu clamav-milter.init script in clamav-milter before 0.95.1+dfsg-1ubuntu1.2 in Ubuntu 9.04 sets the ownership of the current working directory to the clamav account, which might allow local users to bypass intended access restrictions via read or write operations involving this directory. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1601 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19946 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20092 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.2015 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19879 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19958 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20012 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20032 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19987 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.1993 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19907 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19909 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1601 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-1601
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xyb8-pe6q-sbby |
|
| 13 |
| url |
VCID-yuub-nqnn-qyg6 |
| vulnerability_id |
VCID-yuub-nqnn-qyg6 |
| summary |
Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-20328 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48082 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48024 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48047 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48087 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48035 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48038 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48801 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48804 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5076 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50734 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-20328 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-20328
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yuub-nqnn-qyg6 |
|
| 14 |
| url |
VCID-z7du-zx2w-nubk |
| vulnerability_id |
VCID-z7du-zx2w-nubk |
| summary |
ClamAV 0.94.1 and possibly 0.93.1, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5525 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64522 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.644 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64455 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64485 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64444 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64492 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64508 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64524 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64512 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64484 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.64518 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00468 |
| scoring_system |
epss |
| scoring_elements |
0.6453 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5525 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5525
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z7du-zx2w-nubk |
|