var-200501-0297
Vulnerability from variot
McAfee Anti-Virus Engine DATS drivers before 4398 released on Oct 13th 2004 and DATS Driver before 4397 October 6th 2004 allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. A remote attacker can craft a malicious zip archive and send it a vulnerable user. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. McAfee Anti-Virus is an antivirus software
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0297", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "small business suite", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "1.0" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "4.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.86" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.85" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.84" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.83" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.82" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.81" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.80" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.78" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.4.6" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.3, "vendor": "mcafee", "version": "4.3.20" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "gentoo", "version": "1.4" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.2" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.78d" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "archive zip", "scope": "eq", "trust": 1.0, "vendor": "archive zip", "version": "1.13" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "1.4.1.13" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.1" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.3" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "1.4.5" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "1.5" }, { "model": "etrust ez armor", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.0" }, { "model": "inoculateit", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.0" }, { "model": "etrust ez armor", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.4" }, { "model": "etrust ez armor", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.3" }, { "model": "anti-virus d", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.78" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "antivirus rav antivirus for mail servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.4.2" }, { "model": "antivirus rav antivirus for file servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "1.0" }, { "model": "antivirus rav antivirus desktop", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "5.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "4.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "3.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.013" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.012" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.011" }, { "model": "associates inoculateit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates etrust secure content manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.1.13" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.3" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.3" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.2" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates brightstor arcserve backup for windows", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "archive::zip", "scope": "eq", "trust": 0.3, "vendor": "archive zip", "version": "1.13" }, { "model": "archive::zip", "scope": "ne", "trust": 0.3, "vendor": "archive zip", "version": "1.14" } ], "sources": [ { "db": "BID", "id": "11448" }, { "db": "CNNVD", "id": "CNNVD-200501-286" }, { "db": "NVD", "id": "CVE-2004-0932" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Security Advisory\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ], "trust": 0.6 }, "cve": "CVE-2004-0932", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2004-0932", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9362", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-0932", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200501-286", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9362", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9362" }, { "db": "CNNVD", "id": "CNNVD-200501-286" }, { "db": "NVD", "id": "CVE-2004-0932" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "McAfee Anti-Virus Engine DATS drivers before 4398 released on Oct 13th 2004 and DATS Driver before 4397 October 6th 2004 allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. \nA remote attacker can craft a malicious zip archive and send it a vulnerable user. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. McAfee Anti-Virus is an antivirus software", "sources": [ { "db": "NVD", "id": "CVE-2004-0932" }, { "db": "BID", "id": "11448" }, { "db": "VULHUB", "id": "VHN-9362" } ], "trust": 1.26 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9362", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9362" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "11448", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-0932", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200501-286", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "35055", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9362", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9362" }, { "db": "BID", "id": "11448" }, { "db": "CNNVD", "id": "CNNVD-200501-286" }, { "db": "NVD", "id": "CVE-2004-0932" } ] }, "id": "VAR-200501-0297", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9362" } ], "trust": 0.725 }, "last_update_date": "2024-08-14T13:51:14.141000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "McAfee AntiVirus zip Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146864" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0932" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.3, "url": "http://download.mcafee.com/uk/updates/updates.asp" }, { "trust": 0.3, "url": "http://www.nod32.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.ravantivirus.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp" }, { "trust": 0.3, "url": "/archive/1/378660" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9362" }, { "db": "BID", "id": "11448" }, { "db": "CNNVD", "id": "CNNVD-200501-286" }, { "db": "NVD", "id": "CVE-2004-0932" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9362" }, { "db": "BID", "id": "11448" }, { "db": "CNNVD", "id": "CNNVD-200501-286" }, { "db": "NVD", "id": "CVE-2004-0932" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-27T00:00:00", "db": "VULHUB", "id": "VHN-9362" }, { "date": "2004-10-18T00:00:00", "db": "BID", "id": "11448" }, { "date": "2004-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-286" }, { "date": "2005-01-27T05:00:00", "db": "NVD", "id": "CVE-2004-0932" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9362" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11448" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-286" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-0932" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "McAfee AntiVirus zip Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.