Vulnerabilities > Grisoft > AVG Antivirus > 7.0.323
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-11-16 | CVE-2006-5940 | Numeric Errors vulnerability in Grisoft AVG Antivirus Unspecified vulnerability in Grisoft AVG Anti-Virus before 7.1.407 has unknown impact and remote attack vectors related to "Integer Issues" and parsing of .EXE files. | 10.0 |
2006-11-16 | CVE-2006-5939 | Divide BY Zero vulnerability in Grisoft AVG Antivirus Grisoft AVG Anti-Virus before 7.1.407 allows remote attackers to cause a denial of service (crash) via a crafted DOC file that triggers a divide-by-zero error. | 7.8 |
2006-11-16 | CVE-2006-5938 | Improper Input Validation vulnerability in Grisoft AVG Antivirus Grisoft AVG Anti-Virus before 7.1.407 has unknown impact and remote attack vectors involving an uninitialized variable and a crafted CAB file. | 10.0 |
2006-11-16 | CVE-2006-5937 | Integer Overflow OR Wraparound vulnerability in Grisoft AVG Antivirus Multiple integer overflows in Grisoft AVG Anti-Virus before 7.1.407 allow remote attackers to execute arbitrary code via crafted (1) CAB or (2) RAR archives that trigger a heap-based buffer overflow. | 7.5 |
2005-10-30 | CVE-2005-3371 | Unspecified vulnerability in Grisoft AVG Antivirus 7.0.323 Multiple interpretation error in AVG 7 7.0.323 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." | 5.1 |