Hi,
I tried clamdscan with PUA enabled on go source code and seen an error.
Below are error:
clamdscan -v go1.4.2.src.tar.gz
/home/punit/go1.4.2.src.tar.gz: PUA.File.Exploit.CVE_2012_1461 FOUND
--- SCAN SUMMARY ---
Infected files: 1
Time: 0.507 sec (0 m 0 s)
Is it really infec
On Tue, Nov 03, 2015 at 10:06 AM, G.W. Haywood wrote:
>
> Hello again,
>
> On Tue, 3 Nov 2015, Kris Deugau wrote:
>
>> Customers will get very unhappy if you blindly delete all PHP files from
>> their webhosting account...
>
> I don't remember suggesting that.
>
> My point is that ClamAV is d
Hello again,
On Tue, 3 Nov 2015, Kris Deugau wrote:
Customers will get very unhappy if you blindly delete all PHP files from
their webhosting account...
I don't remember suggesting that.
My point is that ClamAV is designed to look for known threats.
The OP is looking for unknown threats.
I
Hello,
Am 02.11.2015 um 19:08 schrieb Kris Deugau:
G.W. Haywood wrote:
Hi there,
On Mon, 2 Nov 2015, Hajo Locke wrote:
... It seems to be so easy for a php-programmer to generate infinite
number of malwarefiles ...
That's correct.
Any .php file sent here goes straight to /dev/null without