Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

clamav

About This Vendor

clamav is a technology vendor producing software and infrastructure products. As a software provider, clamav's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of clamav's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 98 known vulnerabilities from clamav. This includes 8 critical-severity issues and 39 high-severity issues that represent significant risk. These vulnerabilities affect 50 distinct products across clamav's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2005 through 2025, indicating decades of continuous security attention and research. Organizations deploying clamav products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-3501 2005-11-05 2025-04-03 - 4.3 Likely
CVE-2006-1615 2006-04-06 2025-04-03 - 10.0 Likely
CVE-2006-4018 2006-08-08 2025-04-03 - 7.5 Likely
CVE-2007-0897 2007-02-16 2025-04-09 7.5 4.3 Likely
CVE-2007-2650 2007-05-14 2025-04-09 - 4.3 Likely
CVE-2008-0728 2008-02-12 2025-04-09 - 10.0 Likely
CVE-2008-3912 2008-09-11 2025-04-09 - 5.0 Likely
CVE-2008-3913 2008-09-11 2025-04-09 - 5.0 Likely
CVE-2008-3914 2008-09-11 2025-04-09 - 10.0 Likely
CVE-2008-5525 2008-12-12 2025-04-09 - 9.3 Likely
CVE-2009-1241 2009-04-03 2025-04-09 - 7.5 Likely
CVE-2008-6680 2009-04-08 2025-04-09 - 5.0 Likely
CVE-2009-1270 2009-04-08 2025-04-09 - 7.8 Likely
CVE-2009-1371 2009-04-23 2025-04-09 - 5.0 Likely
CVE-2009-1372 2009-04-23 2025-04-09 - 10.0 Likely
CVE-2008-6845 2009-07-02 2025-04-09 - 5.0 Likely
CVE-2010-0098 2010-04-08 2025-04-11 - 10.0 Likely
CVE-2010-1311 2010-04-08 2025-04-11 - 5.0 Likely
CVE-2010-1639 2010-05-26 2025-04-11 - 4.3 Likely
CVE-2010-1640 2010-05-26 2025-04-11 - 4.3 Likely
CVE-2010-3434 2010-09-30 2025-04-11 - 9.3 Likely
CVE-2010-4260 2010-12-07 2025-04-11 - 5.0 Likely
CVE-2010-4261 2010-12-07 2025-04-11 - 7.5 Likely
CVE-2010-4479 2010-12-07 2025-04-11 - 7.5 Likely
CVE-2011-1003 2011-02-23 2025-04-11 - 6.8 Likely
CVE-2011-2721 2011-08-05 2025-04-11 - 5.0 Likely
CVE-2011-3627 2011-11-17 2025-04-11 - 4.3 Likely
CVE-2012-1419 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1443 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1457 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1458 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1459 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2013-2020 2013-05-13 2025-04-11 - 5.0 Likely
CVE-2013-2021 2013-05-13 2025-04-11 - 4.3 Likely
CVE-2013-6497 2014-12-01 2025-04-12 - 2.1 Unknown
CVE-2014-9050 2014-12-01 2025-04-12 - 5.0 Likely
CVE-2014-9328 2015-02-03 2025-04-12 - 7.5 Likely
CVE-2015-1461 2015-02-03 2025-04-12 - 7.5 Likely
CVE-2015-1462 2015-02-03 2025-04-12 - 7.5 Likely
CVE-2015-1463 2015-02-03 2025-04-12 - 5.0 Likely
CVE-2015-2170 2015-05-12 2025-04-12 - 5.0 Likely
CVE-2015-2221 2015-05-12 2025-04-12 - 5.0 Likely
CVE-2015-2222 2015-05-12 2025-04-12 - 5.0 Likely
CVE-2015-2668 2015-05-12 2025-04-12 - 5.0 Likely
CVE-2016-1405 2016-06-08 2025-04-12 7.5 5.0 Likely
CVE-2016-1371 2016-10-03 2025-04-12 5.5 4.3 Likely
CVE-2016-1372 2016-10-03 2025-04-12 5.5 4.3 Likely
CVE-2017-11423 2017-07-18 2025-04-20 5.5 4.3 Likely
CVE-2017-6418 2017-08-07 2025-04-20 5.5 4.3 Likely
CVE-2017-6419 2017-08-07 2025-04-20 7.8 6.8 Likely
CVE-2017-6420 2017-08-07 2025-04-20 5.5 4.3 Likely
CVE-2017-12374 2018-01-26 2024-11-21 7.5 7.8 Likely
CVE-2017-12375 2018-01-26 2024-11-21 7.5 7.8 Likely
CVE-2017-12376 2018-01-26 2024-11-21 7.8 9.3 Likely
CVE-2017-12377 2018-01-26 2024-11-21 9.8 10.0 Likely
CVE-2017-12378 2018-01-26 2024-11-21 5.5 7.1 Likely
CVE-2017-12379 2018-01-26 2024-11-21 9.8 10.0 Likely
CVE-2017-12380 2018-01-26 2024-11-21 7.5 7.8 Likely
CVE-2018-1000085 2018-03-13 2024-11-21 5.5 4.3 Likely
CVE-2018-0202 2018-03-27 2024-11-21 5.5 4.3 Likely
CVE-2018-0360 2018-07-16 2024-11-21 5.5 4.3 Likely
CVE-2018-0361 2018-07-16 2024-11-21 3.3 4.3 Likely
CVE-2018-15378 2018-10-15 2024-11-21 5.5 4.3 Likely
CVE-2019-1785 2019-04-08 2024-11-21 7.8 6.8 Likely
CVE-2019-1786 2019-04-08 2024-11-21 5.5 4.3 Likely
CVE-2019-1787 2019-04-08 2024-11-21 5.5 4.3 Likely
CVE-2019-1788 2019-04-08 2024-11-21 5.5 4.3 Likely
CVE-2019-1798 2019-04-08 2024-11-21 5.5 4.3 Likely
CVE-2019-12625 2019-11-05 2024-11-21 7.5 5.0 Likely
CVE-2019-1789 2019-11-05 2024-11-21 7.5 5.0 Likely
CVE-2007-0899 2019-11-06 2024-11-21 9.8 7.5 Likely
CVE-2007-6745 2019-11-07 2024-11-21 9.8 7.5 Likely
CVE-2013-7087 2019-11-15 2024-11-21 9.8 7.5 Likely
CVE-2013-7088 2019-11-15 2024-11-21 9.8 7.5 Likely
CVE-2013-7089 2019-11-15 2024-11-21 7.5 5.0 Likely
CVE-2019-15961 2020-01-15 2024-11-21 7.5 7.1 Likely
CVE-2020-3123 2020-02-05 2024-11-21 7.5 5.0 Likely
CVE-2020-3481 2020-07-20 2024-11-21 7.5 5.0 Likely
CVE-2021-27506 2021-03-19 2024-11-21 5.5 4.3 Likely
CVE-2021-1252 2021-04-08 2024-11-21 7.5 7.8 Likely
CVE-2021-1404 2021-04-08 2024-11-21 7.5 5.0 Likely
CVE-2021-1405 2021-04-08 2024-11-21 7.5 5.0 Likely
CVE-2022-20698 2022-01-14 2024-11-21 7.5 5.0 Likely
CVE-2022-20770 2022-05-04 2024-11-21 8.6 7.8 Likely
CVE-2022-20771 2022-05-04 2024-11-21 7.5 7.8 Likely
CVE-2022-20785 2022-05-04 2024-11-21 7.5 7.8 Likely
CVE-2022-20796 2022-05-04 2024-11-21 6.5 4.9 Unknown
CVE-2022-20792 2022-08-10 2024-11-21 7.8 - -
CVE-2022-20803 2023-02-17 2024-11-21 8.6 - -
CVE-2023-20032 2023-03-01 2024-11-21 9.8 - -
CVE-2023-20052 2023-03-01 2024-11-21 5.3 - -
CVE-2024-20328 2024-03-01 2025-11-04 5.3 - -
CVE-2024-20380 2024-04-18 2025-07-23 7.5 - -
CVE-2024-20505 2024-09-04 2025-11-03 4.0 - -
CVE-2024-20506 2024-09-04 2025-11-03 6.1 - -
CVE-2025-20128 2025-01-22 2025-11-03 5.3 - -
CVE-2025-20234 2025-06-18 2025-08-11 5.3 - -
CVE-2025-20260 2025-06-18 2025-11-03 9.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for clamav by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with clamav's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.