Search for packages
Package details: pkg:alpm/archlinux/clamav@0.102.3-1
purl pkg:alpm/archlinux/clamav@0.102.3-1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-6rr2-zw7a-kug5 Clamscan vulnerable to command injection clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue. CVE-2020-7613
GHSA-5v25-xr56-phph
VCID-y6tm-b2zf-17ge A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. CVE-2020-3123

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-31T11:36:49.297573+00:00 Arch Linux Importer Fixing VCID-y6tm-b2zf-17ge https://security.archlinux.org/AVG-1168 37.0.0
2025-07-31T11:36:49.271241+00:00 Arch Linux Importer Fixing VCID-6rr2-zw7a-kug5 https://security.archlinux.org/AVG-1168 37.0.0