Because you have not reported it as a False Positive at <http://www.clamav.net/reports/fp>
Also see this identical report from yesterday: <http://lists.clamav.net/pipermail/clamav-users/2016-July/003143.html> -Al- On Mon, Jul 25, 2016 at 02:53 AM, Junuzovic Vahid wrote: > > The last night I got the notification: > --- cut here --- > /usr/share/doc/libxml2-python-2.7.6/reader2.py: Xml.Exploit.CVE_2013_3860-1 > FOUND > > ----------- SCAN SUMMARY ----------- > Known viruses: 4667493 > Engine version: 0.99 > Scanned directories: 0 > Scanned files: 1 > Infected files: 1 > Data scanned: 0.01 MB > Data read: 0.00 MB (ratio 2.00:1) > Time: 13.372 sec (0 m 13 s) > > I've checked the file and it seems to be original file of the package > libxml2-python-2.7.6-21.el6.x86_64. > I checked it on other server and the timestamp/dimension are the same. > I checked also it using Kaspersky and it shows that the file is clean. > > What is the reason that ClamAV is reporting it as Exploit? Some error or > really exploit detected on this file? > > Junuzovic Vahid
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml