var-200501-0311
Vulnerability from variot

Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Eset Anti-Virus is an anti-virus software

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0311",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "small business suite",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "1.0"
      },
      {
        "model": "puremessage anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "4.6"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.86"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.85"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.84"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.83"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.82"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.81"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.80"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.79"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.78"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.4.6"
      },
      {
        "model": "antivirus engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "mcafee",
        "version": "4.3.20"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "9.2"
      },
      {
        "model": "etrust antivirus gateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "7.1"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rav antivirus",
        "version": "8.6"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sophos",
        "version": "3.78d"
      },
      {
        "model": "etrust antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "7.1"
      },
      {
        "model": "etrust ez armor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "2.3"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kaspersky lab",
        "version": "5.0"
      },
      {
        "model": "for file servers",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rav antivirus",
        "version": "1.0"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kaspersky lab",
        "version": "3.0"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "eset",
        "version": "1.0.12"
      },
      {
        "model": "etrust secure content manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.1"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kaspersky lab",
        "version": "4.0"
      },
      {
        "model": "mandrake linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mandrakesoft",
        "version": "10.1"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "eset",
        "version": "1.0.13"
      },
      {
        "model": "etrust ez antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "6.2"
      },
      {
        "model": "etrust antivirus gateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "7.0"
      },
      {
        "model": "for mail servers",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rav antivirus",
        "version": "8.4.2"
      },
      {
        "model": "etrust intrusion detection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.4.1.13"
      },
      {
        "model": "etrust antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "7.0"
      },
      {
        "model": "etrust secure content manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "*"
      },
      {
        "model": "etrust intrusion detection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.5"
      },
      {
        "model": "etrust ez armor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "2.4"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "eset",
        "version": "1.0.11"
      },
      {
        "model": "etrust ez antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "6.1"
      },
      {
        "model": "brightstor arcserve backup",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "11.1"
      },
      {
        "model": "inoculateit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "6.0"
      },
      {
        "model": "etrust intrusion detection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.4.5"
      },
      {
        "model": "etrust ez antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "6.3"
      },
      {
        "model": "etrust ez armor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "2.0"
      },
      {
        "model": "etrust antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ca",
        "version": "7.0_sp2"
      },
      {
        "model": "etrust secure content manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ca",
        "version": "1.0"
      },
      {
        "model": "archive zip",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "archive zip",
        "version": "1.13"
      },
      {
        "model": "inoculateit",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ca",
        "version": "6.0"
      },
      {
        "model": "anti-virus d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sophos",
        "version": "3.78"
      },
      {
        "model": "linux personal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "9.2"
      },
      {
        "model": "antivirus rav antivirus for mail servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rav",
        "version": "8.4.2"
      },
      {
        "model": "antivirus rav antivirus for file servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rav",
        "version": "1.0"
      },
      {
        "model": "antivirus rav antivirus desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rav",
        "version": "8.6"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "10.1"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "10.1"
      },
      {
        "model": "labs antivirus scanning engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kaspersky",
        "version": "5.0"
      },
      {
        "model": "labs antivirus scanning engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kaspersky",
        "version": "4.0"
      },
      {
        "model": "labs antivirus scanning engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kaspersky",
        "version": "3.0"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "eset",
        "version": "1.013"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "eset",
        "version": "1.012"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "eset",
        "version": "1.011"
      },
      {
        "model": "associates inoculateit",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "6.0"
      },
      {
        "model": "associates etrust secure content manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.1"
      },
      {
        "model": "associates etrust secure content manager sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.0"
      },
      {
        "model": "associates etrust secure content manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.0"
      },
      {
        "model": "associates etrust intrusion detection",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.5"
      },
      {
        "model": "associates etrust intrusion detection",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.4.5"
      },
      {
        "model": "associates etrust intrusion detection",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.4.1.13"
      },
      {
        "model": "associates etrust ez armor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "2.4"
      },
      {
        "model": "associates etrust ez armor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "2.3"
      },
      {
        "model": "associates etrust ez armor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "2.0"
      },
      {
        "model": "associates etrust ez antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "6.3"
      },
      {
        "model": "associates etrust ez antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "6.2"
      },
      {
        "model": "associates etrust ez antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "6.1"
      },
      {
        "model": "associates etrust antivirus for the gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.1"
      },
      {
        "model": "associates etrust antivirus for the gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.0"
      },
      {
        "model": "associates etrust antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.1"
      },
      {
        "model": "associates etrust antivirus sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.0"
      },
      {
        "model": "associates etrust antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.0"
      },
      {
        "model": "associates brightstor arcserve backup for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "11.1"
      },
      {
        "model": "archive::zip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "archive zip",
        "version": "1.13"
      },
      {
        "model": "archive::zip",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "archive zip",
        "version": "1.14"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0935"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "iDEFENSE Security Advisory\u203b labs@idefense.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0935",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0935",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-9365",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0935",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#968818",
            "trust": 0.8,
            "value": "7.59"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200501-297",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9365",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9365"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0935"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability.  This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected.  The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security.  If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Eset Anti-Virus is an anti-virus software",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0935"
      },
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9365"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-9365",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9365"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#968818",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "11448",
        "trust": 2.0
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0935",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297",
        "trust": 0.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "629",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-9365",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9365"
      },
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0935"
      }
    ]
  },
  "id": "VAR-200501-0311",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9365"
      }
    ],
    "trust": 0.725
  },
  "last_update_date": "2024-08-14T13:51:14.327000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Eset AntiVirus zip Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146863"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0935"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/11448"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/968818"
      },
      {
        "trust": 1.7,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761"
      },
      {
        "trust": 1.6,
        "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true"
      },
      {
        "trust": 0.8,
        "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html"
      },
      {
        "trust": 0.8,
        "url": "http://rt.cpan.org/noauth/bug.html?id=8077"
      },
      {
        "trust": 0.8,
        "url": "http://www.idefense.com/application/poi/display?id=153"
      },
      {
        "trust": 0.3,
        "url": "http://download.mcafee.com/uk/updates/updates.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.nod32.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.kaspersky.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.ravantivirus.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.sophos.com/"
      },
      {
        "trust": 0.3,
        "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/378660"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9365"
      },
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0935"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9365"
      },
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0935"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-12-10T00:00:00",
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "date": "2005-01-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9365"
      },
      {
        "date": "2004-10-18T00:00:00",
        "db": "BID",
        "id": "11448"
      },
      {
        "date": "2004-10-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      },
      {
        "date": "2005-01-27T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-0935"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-01-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9365"
      },
      {
        "date": "2009-07-12T08:06:00",
        "db": "BID",
        "id": "11448"
      },
      {
        "date": "2021-04-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      },
      {
        "date": "2021-04-09T17:00:09.303000",
        "db": "NVD",
        "id": "CVE-2004-0935"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Anti-virus software may not properly scan malformed zip archives",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-297"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.