Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/clamav@0?distro=trixie
purl pkg:deb/debian/clamav@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (15)
Vulnerability Summary Aliases
VCID-568z-e7ep-dbdz Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2022-20803
VCID-fg72-nbqy-mqgs freshclam in ClamAV in Apple Mac OS X 10.5.8 with Security Update 2009-005 has an incorrect launchd.plist ProgramArguments key and consequently does not run, which might allow remote attackers to introduce viruses into the system. CVE-2010-0058
VCID-jcfy-dyqj-h3aw A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . CVE-2025-20234
VCID-jdn6-r2vx-6fbh Unspecified vulnerability in libclamav/phishcheck.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1, when running on Solaris, allows remote attackers to cause a denial of service (hang) via unknown vectors related to the isURL function and regular expressions. CVE-2007-3025
VCID-k4w5-5g16-x3b2 Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1835
VCID-p14n-mfwj-vufs Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1836
VCID-rhj5-gtyt-2ucn A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software. CVE-2024-20380
VCID-sq4f-krz1-87fw Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2024-20290
VCID-u4q5-6h15-guf2 Multiple interpretation error in unspecified versions of ClamAV Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. CVE-2005-3229
VCID-uvbv-aeft-jyay Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1837
VCID-vhv6-2yu5-wbb3 freshclam in (1) Clam Antivirus (ClamAV) 0.88 and (2) ClamXav 1.0.3h and earlier does not drop privileges before processing the config-file command line option, which allows local users to read portions of arbitrary files when an error message displays the first line of the target file. CVE-2006-2427
VCID-vzhw-bgs7-sye3 Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2023-20212
VCID-xyb8-pe6q-sbby The Ubuntu clamav-milter.init script in clamav-milter before 0.95.1+dfsg-1ubuntu1.2 in Ubuntu 9.04 sets the ownership of the current working directory to the clamav account, which might allow local users to bypass intended access restrictions via read or write operations involving this directory. CVE-2009-1601
VCID-yuub-nqnn-qyg6 Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2024-20328
VCID-z7du-zx2w-nubk ClamAV 0.94.1 and possibly 0.93.1, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. CVE-2008-5525

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:42:32.129050+00:00 Debian Importer Fixing VCID-568z-e7ep-dbdz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:31.868350+00:00 Debian Importer Fixing VCID-fg72-nbqy-mqgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:50.396986+00:00 Debian Importer Fixing VCID-vzhw-bgs7-sye3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:42.821812+00:00 Debian Importer Fixing VCID-jdn6-r2vx-6fbh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:12.913238+00:00 Debian Importer Fixing VCID-uvbv-aeft-jyay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:34.463457+00:00 Debian Importer Fixing VCID-jcfy-dyqj-h3aw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:21.758665+00:00 Debian Importer Fixing VCID-vhv6-2yu5-wbb3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:18.113261+00:00 Debian Importer Fixing VCID-yuub-nqnn-qyg6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:01.852815+00:00 Debian Importer Fixing VCID-xyb8-pe6q-sbby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:31.259505+00:00 Debian Importer Fixing VCID-z7du-zx2w-nubk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:58.555545+00:00 Debian Importer Fixing VCID-sq4f-krz1-87fw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:18.430774+00:00 Debian Importer Fixing VCID-k4w5-5g16-x3b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:23.536296+00:00 Debian Importer Fixing VCID-u4q5-6h15-guf2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:35.151842+00:00 Debian Importer Fixing VCID-rhj5-gtyt-2ucn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:26.701904+00:00 Debian Importer Fixing VCID-p14n-mfwj-vufs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:07:15.013859+00:00 Debian Importer Fixing VCID-xyb8-pe6q-sbby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:48.164132+00:00 Debian Importer Fixing VCID-uvbv-aeft-jyay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:28.179721+00:00 Debian Importer Fixing VCID-jdn6-r2vx-6fbh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:10.774670+00:00 Debian Importer Fixing VCID-vhv6-2yu5-wbb3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:47.515171+00:00 Debian Importer Fixing VCID-568z-e7ep-dbdz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:28.847212+00:00 Debian Importer Fixing VCID-fg72-nbqy-mqgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:48.225859+00:00 Debian Importer Fixing VCID-yuub-nqnn-qyg6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:45.714730+00:00 Debian Importer Fixing VCID-vzhw-bgs7-sye3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:23.291347+00:00 Debian Importer Fixing VCID-z7du-zx2w-nubk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:04.793716+00:00 Debian Importer Fixing VCID-p14n-mfwj-vufs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:03.171724+00:00 Debian Importer Fixing VCID-jcfy-dyqj-h3aw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:17.318712+00:00 Debian Importer Fixing VCID-rhj5-gtyt-2ucn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:22.192601+00:00 Debian Importer Fixing VCID-sq4f-krz1-87fw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:23.934033+00:00 Debian Importer Fixing VCID-k4w5-5g16-x3b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:39.794445+00:00 Debian Importer Fixing VCID-u4q5-6h15-guf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:17:53.732940+00:00 Debian Importer Fixing VCID-xyb8-pe6q-sbby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:56.223596+00:00 Debian Importer Fixing VCID-uvbv-aeft-jyay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:42.029200+00:00 Debian Importer Fixing VCID-jdn6-r2vx-6fbh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:44.571082+00:00 Debian Importer Fixing VCID-vhv6-2yu5-wbb3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:29.649785+00:00 Debian Importer Fixing VCID-568z-e7ep-dbdz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:42.760165+00:00 Debian Importer Fixing VCID-fg72-nbqy-mqgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:39.497636+00:00 Debian Importer Fixing VCID-yuub-nqnn-qyg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:29.962157+00:00 Debian Importer Fixing VCID-vzhw-bgs7-sye3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:14.764888+00:00 Debian Importer Fixing VCID-z7du-zx2w-nubk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:36.987423+00:00 Debian Importer Fixing VCID-p14n-mfwj-vufs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:31.076999+00:00 Debian Importer Fixing VCID-jcfy-dyqj-h3aw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:33.758508+00:00 Debian Importer Fixing VCID-rhj5-gtyt-2ucn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:56.103594+00:00 Debian Importer Fixing VCID-sq4f-krz1-87fw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:26.355006+00:00 Debian Importer Fixing VCID-k4w5-5g16-x3b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:37.984191+00:00 Debian Importer Fixing VCID-u4q5-6h15-guf2 https://security-tracker.debian.org/tracker/data/json 38.1.0