Broadcom

Etrust Intrusion Detection

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 30.03%
  • Veröffentlicht 27.01.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow ...

Exploit
  • EPSS 39.95%
  • Veröffentlicht 27.01.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.

Exploit
  • EPSS 13.2%
  • Veröffentlicht 27.01.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target s...

Exploit
  • EPSS 13.2%
  • Veröffentlicht 27.01.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.

Exploit
  • EPSS 20.25%
  • Veröffentlicht 10.01.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compres...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 07.06.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

eTrust Intrusion Detection System (formerly SessionWall-3) uses weak encryption (XOR) to store administrative passwords in the registry, which allows local users to easily decrypt the passwords.