Search for vulnerabilities
Vulnerability details: VCID-9k77-mzjv-aaac
Vulnerability ID VCID-9k77-mzjv-aaac
Aliases CVE-2012-1419
Summary The TAR file parser in ClamAV 0.96.4 and Quick Heal (aka Cat QuickHeal) 11.00 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial [aliases] character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
Status Published
Exploitability 2.0
Weighted Severity 3.9
Risk 7.8
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.02837 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03728 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.03804 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.89504 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
epss 0.91225 https://api.first.org/data/v1/epss?cve=CVE-2012-1419
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2012-1419
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2012-1419
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.85573
EPSS Score 0.02837
Published At June 3, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.