Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2005-3399

EPSS 0.22% · P44
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2005-3399

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple interpretation error in CAT-QuickHeal 8.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
CAT-QuickHeal病毒扫描绕过漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TheHacker 是一款反病毒引擎。 CAT-QuickHeal8.0中的多个解释错误可让远程攻击者通过带有"MZ标识字节顺序的BAT、HTML和EML等文件绕过病毒扫描,这种文件通常与EXE关联,它会使该文件被视为安全类型,仍可由应用程序在最终系统上作为危险文件类型来执行,如同包含EXE、EML和HTML内容的"triple headed"程序所说明的那样,也称为"标识字节缺陷"。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2005-3399

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2005-3399

登录查看更多情报信息。

Same Patch Batch · n/a · 2005-11-01 · 44 CVEs total

CVE-2005-3402Mozilla Thunderbird不安全SMTP认证协议协商漏洞
CVE-2005-3405Atutor执行任意PHP函数漏洞
CVE-2005-3404ATutor多个PHP文件包含漏洞
CVE-2005-3406phpESP跨站脚本漏洞
CVE-2005-2977PAM Unix_Chkpwd暴力密码破解漏洞
CVE-2005-3387Ntop ntop.init不安全临时文件创建漏洞
CVE-2005-3388PHP phpinfo()跨站脚本漏洞
CVE-2005-3389PHP parse_str()函数激活register_globals变量漏洞
CVE-2005-3390PHP文件上传$GLOBALS变量覆盖漏洞
CVE-2005-3408Greg GCards News.PHP SQL注入漏洞
CVE-2005-3403ATutor多个跨站脚本漏洞
CVE-2005-3401TheHacker病毒扫描绕过漏洞
CVE-2005-3400Fortinet病毒扫描绕过漏洞
CVE-2005-3398Sun Solaris管理控制台HTTP TRACE信息泄露漏洞
CVE-2005-3397Comersus BackOffice comersus_backoffice_supportError.asp跨站脚本攻击(XSS)漏洞
CVE-2005-3396IBM AIX chcons命令本地溢出漏洞
CVE-2005-3395Invision Gallery Index.PHP SQL注入漏洞
CVE-2005-3394OaBoard Forum.PHP多个SQL注入漏洞
CVE-2005-3393OpenVPN客户端远程格式串处理漏洞
CVE-2005-3392PHP Apache 2 Virtual() Safe_Mode和Open_Basedir限制绕过漏洞

Showing top 20 of 44 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2005-3399

No comments yet


Leave a comment