Search for packages
Package details: pkg:deb/debian/clamav@0.94.dfsg.2-1lenny2
purl pkg:deb/debian/clamav@0.94.dfsg.2-1lenny2
Next non-vulnerable version 1.0.9+dfsg-1~deb12u1
Latest non-vulnerable version 1.0.9+dfsg-1~deb12u1
Risk 4.5
Vulnerabilities affecting this package (85)
Vulnerability Summary Fixed by
VCID-23jp-v525-uqgu
Aliases:
CVE-2010-4260
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-2c2z-nqkt-u7g9
Aliases:
CVE-2015-1463
0.98.6+dfsg-1
Affected by 52 other vulnerabilities.
VCID-2msu-u9hu-cfe8
Aliases:
CVE-2019-1798
A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-3317-da3v-5ud1
Aliases:
CVE-2021-1405
A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
0.103.6+dfsg-0+deb10u1
Affected by 10 other vulnerabilities.
VCID-34xj-kgyc-h3ar
Aliases:
CVE-2010-0405
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-3gu3-p2rm-3fft
Aliases:
CVE-2019-1789
ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-3qfr-u4s5-wubd
Aliases:
CVE-2022-20771
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
0.103.10+dfsg-0+deb11u1
Affected by 4 other vulnerabilities.
VCID-3vpu-4jbu-u7f6
Aliases:
CVE-2010-1640
AntiVirus: Off-by-one error (DoS, crash) by parsing a specially-crafted PE icon file
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-3vqs-6pnu-yycq
Aliases:
CVE-2019-1787
A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-46ev-hf8j-u3es
Aliases:
CVE-2019-15961
A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-46n9-x82h-mkhq
Aliases:
CVE-2019-1788
A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-4taw-7hgs-abb9
Aliases:
CVE-2018-0361
ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-5qyd-mg1z-qqc7
Aliases:
CVE-2018-15378
A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-5s2x-z4zt-33a9
Aliases:
CVE-2012-1419
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-66qn-pkj1-kua6
Aliases:
CVE-2013-7087
ClamAV before 0.97.7 has WWPack corrupt heap memory
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-6mwd-zex5-2fa6
Aliases:
CVE-2012-1457
PYSEC-2012-25
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-6wm8-cxsz-4uan
Aliases:
CVE-2009-1372
clamav: security fixes in upstream 0.95.1 (CVE-2009-1371, CVE-2009-1372)
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-79a9-ww3a-a3dy
Aliases:
CVE-2020-3350
A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.
0.103.6+dfsg-0+deb10u1
Affected by 10 other vulnerabilities.
VCID-7jaa-ct6b-wbg8
Aliases:
CVE-2017-12376
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-8csj-tv3j-xbe8
Aliases:
CVE-2009-1270
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-8js9-15v6-x7fg
Aliases:
CVE-2015-2668
0.99+dfsg-0+deb6u1
Affected by 47 other vulnerabilities.
VCID-9yty-d1h1-fbdw
Aliases:
CVE-2020-3341
A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
0.103.6+dfsg-0+deb10u1
Affected by 10 other vulnerabilities.
VCID-abeu-mqnf-jfbt
Aliases:
CVE-2013-7088
ClamAV before 0.97.7 has buffer overflow in the libclamav component
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-addv-ycrj-s7fj
Aliases:
CVE-2009-3736
libtool: libltdl may load and execute code from a library in the current directory
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-aeru-cs5s-gydz
Aliases:
CVE-2012-1459
PYSEC-2012-26
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-af2z-bq82-6yeg
Aliases:
CVE-2020-3327
A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
0.103.6+dfsg-0+deb10u1
Affected by 10 other vulnerabilities.
VCID-apwr-ce4g-5uhb
Aliases:
CVE-2009-1241
clamav: security fixes in upstream 0.95 (CVE-2008-6680, CVE-2009-1270)
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-askz-hj6m-zqgs
Aliases:
CVE-2023-20032
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code. This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition. For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"].
0.103.10+dfsg-0+deb11u1
Affected by 4 other vulnerabilities.
VCID-aukf-hqgj-gycm
Aliases:
CVE-2010-4479
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-bfcy-rjj2-33fr
Aliases:
CVE-2019-1786
A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-bj6c-z9dm-uyep
Aliases:
CVE-2019-12625
ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-bjd1-5y5x-p7ek
Aliases:
CVE-2022-20792
A vulnerability in the regex module used by the signature database load module of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an authenticated, local attacker to crash ClamAV at database load time, and possibly gain code execution. The vulnerability is due to improper bounds checking that may result in a multi-byte heap buffer overwflow write. An attacker could exploit this vulnerability by placing a crafted CDB ClamAV signature database file in the ClamAV database directory. An exploit could allow the attacker to run code as the clamav user.
0.103.10+dfsg-0+deb11u1
Affected by 4 other vulnerabilities.
VCID-bzec-5mmm-43hr
Aliases:
CVE-2010-1639
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-c1gf-57fd-fqhj
Aliases:
CVE-2017-11423
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-ccnu-rkcm-d7h8
Aliases:
CVE-2011-2721
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-djz1-c95q-tfdr
Aliases:
CVE-2019-1785
A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-dyut-c62w-3bh8
Aliases:
CVE-2015-2222
0.99+dfsg-0+deb6u1
Affected by 47 other vulnerabilities.
VCID-fpfa-wu1x-g3ce
Aliases:
CVE-2015-2305
0.99+dfsg-0+deb6u1
Affected by 47 other vulnerabilities.
VCID-frmm-y131-c7ht
Aliases:
CVE-2022-20698
A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
0.103.6+dfsg-0+deb10u1
Affected by 10 other vulnerabilities.
VCID-fv3m-kt1d-xbev
Aliases:
CVE-2017-6418
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-fytj-r2gu-k3fm
Aliases:
CVE-2023-20052
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.
0.103.10+dfsg-0+deb11u1
Affected by 4 other vulnerabilities.
VCID-g4pn-eq58-yqa3
Aliases:
CVE-2019-12900
BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-ged8-dga7-tqcq
Aliases:
CVE-2024-20506
A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.
1.0.7+dfsg-1~deb12u1
Affected by 2 other vulnerabilities.
VCID-gvap-y9mh-gfdu
Aliases:
CVE-2016-1405
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-haj7-a256-pyam
Aliases:
CVE-2013-6497
0.98.6+dfsg-1
Affected by 52 other vulnerabilities.
VCID-heut-fk4k-gkag
Aliases:
CVE-2008-6680
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-hjx8-s54e-tbcc
Aliases:
CVE-2010-4261
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-hpez-24dp-wud8
Aliases:
CVE-2013-7089
ClamAV before 0.97.7: dbg_printhex possible information leak
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-jcz8-qze4-nkab
Aliases:
CVE-2015-2221
0.99+dfsg-0+deb6u1
Affected by 47 other vulnerabilities.
VCID-jxrh-ng7c-cqf5
Aliases:
CVE-2015-1462
0.98.6+dfsg-1
Affected by 52 other vulnerabilities.
VCID-k58u-2xqh-euha
Aliases:
CVE-2015-1461
0.98.6+dfsg-1
Affected by 52 other vulnerabilities.
VCID-k6y9-gydd-zfhq
Aliases:
CVE-2017-12379
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-kczx-qcnt-kkc3
Aliases:
CVE-2022-20770
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
0.103.10+dfsg-0+deb11u1
Affected by 4 other vulnerabilities.
VCID-kj3k-umkt-zbd1
Aliases:
CVE-2017-12374
The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-m28h-x4mb-5ffv
Aliases:
CVE-2017-12380
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-mj6x-a67s-wyf3
Aliases:
CVE-2014-9328
0.98.6+dfsg-1
Affected by 52 other vulnerabilities.
VCID-mthh-r3uq-p7gf
Aliases:
CVE-2010-1311
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-mzv6-epa4-g3dq
Aliases:
CVE-2021-1252
A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.
0.103.6+dfsg-0+deb10u1
Affected by 10 other vulnerabilities.
VCID-nknq-dpge-ybhu
Aliases:
CVE-2010-3434
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-pjvu-3smx-47c7
Aliases:
CVE-2015-2170
0.99+dfsg-0+deb6u1
Affected by 47 other vulnerabilities.
VCID-ppa9-ft1j-abg7
Aliases:
CVE-2020-3481
A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
0.103.6+dfsg-0+deb10u1
Affected by 10 other vulnerabilities.
VCID-pxh3-dbkd-u7hb
Aliases:
CVE-2018-1000085
ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-q4t1-717r-yuce
Aliases:
CVE-2014-9050
0.98.6+dfsg-1
Affected by 52 other vulnerabilities.
VCID-q55j-wnz8-dbbv
Aliases:
CVE-2016-1372
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-qb6y-7796-bycj
Aliases:
CVE-2013-2020
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-rb7f-xsv8-buew
Aliases:
CVE-2010-0098
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-rbst-yfc2-c7hg
Aliases:
CVE-2024-20505
A vulnerability in the PDF parsing module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an out of bounds read. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. An exploit could allow the attacker to terminate the scanning process.
1.0.7+dfsg-1~deb12u1
Affected by 2 other vulnerabilities.
VCID-skgm-6wnq-p3by
Aliases:
CVE-2017-12378
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-t9k5-dpjk-uycb
Aliases:
CVE-2012-1458
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-tkmc-1qrc-zuak
Aliases:
CVE-2017-6419
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-u1w4-q141-e7ds
Aliases:
CVE-2022-20785
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
0.103.10+dfsg-0+deb11u1
Affected by 4 other vulnerabilities.
VCID-uaz7-bd7k-3baa
Aliases:
CVE-2021-1404
A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
0.103.6+dfsg-0+deb10u1
Affected by 10 other vulnerabilities.
VCID-ustw-jknw-cfey
Aliases:
CVE-2022-20796
On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.
0.103.10+dfsg-0+deb11u1
Affected by 4 other vulnerabilities.
VCID-uwja-2b17-7bec
Aliases:
CVE-2011-1003
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-uyxs-j14t-83fy
Aliases:
CVE-2011-3627
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-v7u1-p9jh-kkda
Aliases:
CVE-2016-1371
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-vegz-4871-8fcx
Aliases:
CVE-2017-12375
The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-vk8j-ajg7-5uea
Aliases:
CVE-2023-20197
A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
0.103.10+dfsg-0+deb11u1
Affected by 4 other vulnerabilities.
VCID-wd3j-n27r-kkae
Aliases:
CVE-2017-12377
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-xqks-7888-ekbs
Aliases:
CVE-2017-6420
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-y6tm-b2zf-17ge
Aliases:
CVE-2020-3123
A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-yjqk-b2zt-87g4
Aliases:
CVE-2009-1371
clamav: security fixes in upstream 0.95.1 (CVE-2009-1371, CVE-2009-1372)
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
VCID-yprs-vm2b-1yby
Aliases:
CVE-2018-0360
ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.
0.102.3+dfsg-0~deb9u1
Affected by 18 other vulnerabilities.
VCID-ytfp-zwek-cbbn
Aliases:
CVE-2018-0202
clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.
0.100.0+dfsg-0+deb8u1
Affected by 31 other vulnerabilities.
VCID-zwry-das6-2fg4
Aliases:
CVE-2013-2021
0.98.1+dfsg-1+deb6u3
Affected by 58 other vulnerabilities.
Vulnerabilities fixed by this package (32)
Vulnerability Summary Aliases
VCID-24yc-vp2s-a7ck clamav: PeSpin Heap Overflow Vulnerability CVE-2008-0314
VCID-3qgq-wrh4-xbec clamav: DoS / crash via crafted petite file (incomplete fix of CVE-2008-2713) CVE-2008-3215
VCID-439v-9xkt-dqat clamav: MEW PE File Integer Overflow Vulnerability (was CVE-2007-5759) CVE-2007-6335
VCID-4v7d-y4kf-xqf6 CVE-2007-3023
VCID-74px-fprq-jfb9 CVE-2008-5050
VCID-7swr-q6vp-jba4 clamav does not recognize Base64-UUEncoded files CVE-2007-6596
VCID-7vay-ce9v-1uds CVE-2008-3913
VCID-9mxy-epaw-dfh3 CVE-2007-3123
VCID-cear-48ap-93ar CVE-2008-3914
VCID-cyx1-63d4-13eg CVE-2008-5314
VCID-d6dc-h68d-wbge clamav: multiple security fixes in 0.94 (CVE-2008-1389, CVE-2008-3912, CVE-2008-3913, CVE-2008-3914) CVE-2008-1389
VCID-daqm-pjz2-sfgn clamav: Endless loop / hang with crafted arj CVE-2008-1387
VCID-dfvd-qt1t-gkba clamav 0.91.2 suffers from a floating point exception when using ScanOLE2. CVE-2007-6745
VCID-g1g6-t4c5-a7hd clamav: undocumented bzlib issue CVE-2007-6337
VCID-gvvt-r2rn-7qfh CVE-2007-3024
VCID-h4n9-8cff-vufx CVE-2007-2029
VCID-hg18-b5q2-bua6 CVE-2008-6845
VCID-huhd-8ts7-kufj CVE-2007-4560
VCID-j87k-97a9-vba6 clamav: off-by-one in the MS-ZIP decompression code CVE-2007-6336
VCID-kkuj-zt9b-4yfh clamav: PE WWPack Heap Overflow Vulnerability CVE-2008-1833
VCID-kpkn-jtxh-j7d9 clamav: DoS / crash via crafted petite file CVE-2008-2713
VCID-mzxq-84j2-1yez clamav: libclamav heap corruption CVE-2008-0728
VCID-p6za-nbk6-r7a2 CVE-2008-3912
VCID-qk81-7ea1-kyaw CVE-2007-1745
VCID-r93m-mmrx-n7cy CVE-2007-2650
VCID-stgd-md7u-tyb8 CVE-2007-3725
VCID-vjp8-cv5y-jqac CVE-2007-3122
VCID-vmtz-6ycd-h3hh clamav insecure /tmp file use CVE-2007-6595
VCID-w84a-e6bb-uybj clamav: Integer overflow in libclamav CVE-2008-0318
VCID-wcbq-p5kp-cbg6 CVE-2007-4510
VCID-xysn-qn76-rbeb clamav: Upack Processing Buffer Overflow Vulnerability CVE-2008-1100
VCID-yba1-eytx-3qez CVE-2007-1997

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T20:12:31.381096+00:00 Debian Oval Importer Affected by VCID-aukf-hqgj-gycm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T20:07:46.527282+00:00 Debian Oval Importer Fixing VCID-daqm-pjz2-sfgn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T20:03:38.433324+00:00 Debian Oval Importer Affected by VCID-zwry-das6-2fg4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T20:00:14.528214+00:00 Debian Oval Importer Affected by VCID-46ev-hf8j-u3es https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:43:48.354365+00:00 Debian Oval Importer Fixing VCID-cyx1-63d4-13eg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:34:50.381638+00:00 Debian Oval Importer Affected by VCID-aeru-cs5s-gydz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:32:00.487298+00:00 Debian Oval Importer Affected by VCID-bj6c-z9dm-uyep https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:23:17.331989+00:00 Debian Oval Importer Affected by VCID-3qfr-u4s5-wubd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:22:43.288268+00:00 Debian Oval Importer Affected by VCID-rb7f-xsv8-buew https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:19:12.216285+00:00 Debian Oval Importer Affected by VCID-4taw-7hgs-abb9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:18:35.897287+00:00 Debian Oval Importer Fixing VCID-h4n9-8cff-vufx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:17:44.281769+00:00 Debian Oval Importer Affected by VCID-uwja-2b17-7bec https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:09:43.970904+00:00 Debian Oval Importer Affected by VCID-ytfp-zwek-cbbn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:06:36.381170+00:00 Debian Oval Importer Affected by VCID-8js9-15v6-x7fg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:06:33.107388+00:00 Debian Oval Importer Affected by VCID-9yty-d1h1-fbdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:06:31.647255+00:00 Debian Oval Importer Fixing VCID-vjp8-cv5y-jqac https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:58:19.489913+00:00 Debian Oval Importer Fixing VCID-dfvd-qt1t-gkba https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:56:50.352751+00:00 Debian Oval Importer Affected by VCID-hjx8-s54e-tbcc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:56:18.288025+00:00 Debian Oval Importer Affected by VCID-fpfa-wu1x-g3ce https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:34:07.855206+00:00 Debian Oval Importer Affected by VCID-qb6y-7796-bycj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:30:54.356916+00:00 Debian Oval Importer Affected by VCID-askz-hj6m-zqgs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:28:51.599007+00:00 Debian Oval Importer Affected by VCID-hpez-24dp-wud8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:11:07.434837+00:00 Debian Oval Importer Affected by VCID-uaz7-bd7k-3baa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:09:31.031827+00:00 Debian Oval Importer Affected by VCID-6mwd-zex5-2fa6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:06:04.358221+00:00 Debian Oval Importer Affected by VCID-dyut-c62w-3bh8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:05:55.196648+00:00 Debian Oval Importer Affected by VCID-yjqk-b2zt-87g4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:00:11.507560+00:00 Debian Oval Importer Affected by VCID-v7u1-p9jh-kkda https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:55:39.016707+00:00 Debian Oval Importer Affected by VCID-haj7-a256-pyam https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:54:09.495213+00:00 Debian Oval Importer Fixing VCID-huhd-8ts7-kufj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:52:19.659750+00:00 Debian Oval Importer Affected by VCID-abeu-mqnf-jfbt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:49:07.118094+00:00 Debian Oval Importer Affected by VCID-jcz8-qze4-nkab https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:34:27.857873+00:00 Debian Oval Importer Affected by VCID-2c2z-nqkt-u7g9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:09:48.884356+00:00 Debian Oval Importer Affected by VCID-8csj-tv3j-xbe8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:08:41.931922+00:00 Debian Oval Importer Affected by VCID-gvap-y9mh-gfdu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:08:31.623123+00:00 Debian Oval Importer Affected by VCID-3vpu-4jbu-u7f6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:03:12.712609+00:00 Debian Oval Importer Affected by VCID-bfcy-rjj2-33fr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:53:42.582092+00:00 Debian Oval Importer Affected by VCID-7jaa-ct6b-wbg8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:47:34.978185+00:00 Debian Oval Importer Fixing VCID-kkuj-zt9b-4yfh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:44:39.895249+00:00 Debian Oval Importer Affected by VCID-xqks-7888-ekbs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:44:24.989601+00:00 Debian Oval Importer Affected by VCID-jxrh-ng7c-cqf5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:43:57.875521+00:00 Debian Oval Importer Affected by VCID-k6y9-gydd-zfhq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:42:41.501552+00:00 Debian Oval Importer Affected by VCID-c1gf-57fd-fqhj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:39:22.777907+00:00 Debian Oval Importer Fixing VCID-gvvt-r2rn-7qfh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:39:01.806111+00:00 Debian Oval Importer Affected by VCID-rbst-yfc2-c7hg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:32:52.265523+00:00 Debian Oval Importer Fixing VCID-cear-48ap-93ar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:13:12.750421+00:00 Debian Oval Importer Fixing VCID-d6dc-h68d-wbge https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:06:52.710397+00:00 Debian Oval Importer Affected by VCID-3vqs-6pnu-yycq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:05:39.261408+00:00 Debian Oval Importer Fixing VCID-74px-fprq-jfb9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:04:35.699427+00:00 Debian Oval Importer Affected by VCID-mzv6-epa4-g3dq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:04:30.799549+00:00 Debian Oval Importer Fixing VCID-wcbq-p5kp-cbg6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:41:42.827548+00:00 Debian Oval Importer Affected by VCID-ccnu-rkcm-d7h8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:31:11.254826+00:00 Debian Oval Importer Affected by VCID-ustw-jknw-cfey https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:28:04.158698+00:00 Debian Oval Importer Affected by VCID-6wm8-cxsz-4uan https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:27:01.326109+00:00 Debian Oval Importer Affected by VCID-3317-da3v-5ud1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:22:04.358147+00:00 Debian Oval Importer Affected by VCID-k58u-2xqh-euha https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:14:14.702687+00:00 Debian Oval Importer Affected by VCID-5qyd-mg1z-qqc7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:08:41.824400+00:00 Debian Oval Importer Affected by VCID-66qn-pkj1-kua6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:02:30.481317+00:00 Debian Oval Importer Affected by VCID-vegz-4871-8fcx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:00:53.325131+00:00 Debian Oval Importer Fixing VCID-w84a-e6bb-uybj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:58:23.599213+00:00 Debian Oval Importer Affected by VCID-2msu-u9hu-cfe8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:57:12.627815+00:00 Debian Oval Importer Affected by VCID-t9k5-dpjk-uycb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:56:54.279233+00:00 Debian Oval Importer Fixing VCID-9mxy-epaw-dfh3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:52:23.519850+00:00 Debian Oval Importer Affected by VCID-3gu3-p2rm-3fft https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:51:18.137035+00:00 Debian Oval Importer Fixing VCID-yba1-eytx-3qez https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:49:16.276439+00:00 Debian Oval Importer Affected by VCID-ged8-dga7-tqcq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:48:39.942490+00:00 Debian Oval Importer Affected by VCID-frmm-y131-c7ht https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:42:40.440411+00:00 Debian Oval Importer Affected by VCID-q55j-wnz8-dbbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:33:38.832769+00:00 Debian Oval Importer Affected by VCID-wd3j-n27r-kkae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:25:59.717522+00:00 Debian Oval Importer Fixing VCID-mzxq-84j2-1yez https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:25:19.116066+00:00 Debian Oval Importer Affected by VCID-tkmc-1qrc-zuak https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:23:12.821865+00:00 Debian Oval Importer Affected by VCID-5s2x-z4zt-33a9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:22:56.281859+00:00 Debian Oval Importer Affected by VCID-uyxs-j14t-83fy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:18:12.350540+00:00 Debian Oval Importer Affected by VCID-m28h-x4mb-5ffv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:08:56.646681+00:00 Debian Oval Importer Affected by VCID-u1w4-q141-e7ds https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:05:35.140458+00:00 Debian Oval Importer Affected by VCID-ppa9-ft1j-abg7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:04:16.740917+00:00 Debian Oval Importer Fixing VCID-p6za-nbk6-r7a2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:01:53.511015+00:00 Debian Oval Importer Fixing VCID-hg18-b5q2-bua6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:57:22.843796+00:00 Debian Oval Importer Affected by VCID-y6tm-b2zf-17ge https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:54:23.217716+00:00 Debian Oval Importer Affected by VCID-23jp-v525-uqgu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:52:55.902149+00:00 Debian Oval Importer Affected by VCID-mj6x-a67s-wyf3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:52:43.156121+00:00 Debian Oval Importer Fixing VCID-xysn-qn76-rbeb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:49:28.849454+00:00 Debian Oval Importer Fixing VCID-3qgq-wrh4-xbec https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:46:22.254627+00:00 Debian Oval Importer Fixing VCID-24yc-vp2s-a7ck https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:45:33.417190+00:00 Debian Oval Importer Affected by VCID-mthh-r3uq-p7gf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:44:04.867113+00:00 Debian Oval Importer Affected by VCID-skgm-6wnq-p3by https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:43:37.580479+00:00 Debian Oval Importer Affected by VCID-yprs-vm2b-1yby https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:36:26.263684+00:00 Debian Oval Importer Affected by VCID-pxh3-dbkd-u7hb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:34:12.442396+00:00 Debian Oval Importer Affected by VCID-pjvu-3smx-47c7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:23:23.749434+00:00 Debian Oval Importer Affected by VCID-46n9-x82h-mkhq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:22:32.451638+00:00 Debian Oval Importer Fixing VCID-stgd-md7u-tyb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:16:04.407039+00:00 Debian Oval Importer Fixing VCID-vmtz-6ycd-h3hh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:15:56.437840+00:00 Debian Oval Importer Affected by VCID-nknq-dpge-ybhu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:15:33.038792+00:00 Debian Oval Importer Affected by VCID-fv3m-kt1d-xbev https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:14:56.236556+00:00 Debian Oval Importer Affected by VCID-djz1-c95q-tfdr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:14:47.732295+00:00 Debian Oval Importer Affected by VCID-addv-ycrj-s7fj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:14:31.365143+00:00 Debian Oval Importer Affected by VCID-g4pn-eq58-yqa3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:04:21.999126+00:00 Debian Oval Importer Fixing VCID-kpkn-jtxh-j7d9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:03:23.038630+00:00 Debian Oval Importer Affected by VCID-kczx-qcnt-kkc3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:57:52.658763+00:00 Debian Oval Importer Affected by VCID-79a9-ww3a-a3dy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:57:36.218845+00:00 Debian Oval Importer Affected by VCID-heut-fk4k-gkag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:53:58.672182+00:00 Debian Oval Importer Fixing VCID-r93m-mmrx-n7cy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:53:32.357716+00:00 Debian Oval Importer Affected by VCID-apwr-ce4g-5uhb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:42:14.799829+00:00 Debian Oval Importer Fixing VCID-439v-9xkt-dqat https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:35:33.772460+00:00 Debian Oval Importer Fixing VCID-4v7d-y4kf-xqf6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:34:17.249775+00:00 Debian Oval Importer Fixing VCID-7vay-ce9v-1uds https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:32:37.750523+00:00 Debian Oval Importer Affected by VCID-af2z-bq82-6yeg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:32:08.651074+00:00 Debian Oval Importer Affected by VCID-q4t1-717r-yuce https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:29:38.339070+00:00 Debian Oval Importer Fixing VCID-7swr-q6vp-jba4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:16:44.034216+00:00 Debian Oval Importer Affected by VCID-fytj-r2gu-k3fm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:13:40.033753+00:00 Debian Oval Importer Affected by VCID-34xj-kgyc-h3ar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:09:27.877678+00:00 Debian Oval Importer Affected by VCID-bzec-5mmm-43hr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:07:11.947622+00:00 Debian Oval Importer Affected by VCID-vk8j-ajg7-5uea https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:05:47.464241+00:00 Debian Oval Importer Fixing VCID-qk81-7ea1-kyaw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:00:58.312563+00:00 Debian Oval Importer Affected by VCID-bjd1-5y5x-p7ek https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:00:53.462620+00:00 Debian Oval Importer Affected by VCID-kj3k-umkt-zbd1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:57:33.658896+00:00 Debian Oval Importer Fixing VCID-g1g6-t4c5-a7hd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:49:28.941933+00:00 Debian Oval Importer Fixing VCID-j87k-97a9-vba6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0