?
Regards,
Claudio Cuqui
PS: I tested with clamscan -d my.ndb scanning a full message (headers
included) in a file.
___
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml
the
0a character at the end). After removing the 0a from my signatures they
"magically" started to work.
Best regards, and, again, thank you for your time and help.
Claudio Cuqui
On 05/23/2014 04:06 PM, Steve Basford wrote:
On Fri, May 23, 2014 4:25 pm, Claudio Cuqui wrote:
Hello t
r for trie
Best Regards,
Claudio Cuqui
On 5/16/23 07:02, Matthias Rieber wrote:
Hello List,
since the update to version 26908 we observe a high amount of segfaults.
As far as I can tell this happens in
0x7fdfd44c377d
We use version 0.103.8+dfsg-0+deb11u1 on debian bullseye.
Has anyone seen
eck: Phishing scan result: Blacklisted
LibClamAV debug: found Possibly Unwanted:
Safebrowsing.Suspected-malware_safebrowsing.clamav.net
*LibClamAV debug: blobDestroy
Regards !
Claudio Cuqui
___
Help us build a comprehensive ClamAV guide: visit h
,
Claudio Cuqui
On 04/24/2011 09:30 AM, Steven Chamberlain wrote:
On -10/01/37 20:59, Johannes Schulz wrote:
"sigtool -fPUA.PDF.OpenActionObject|sigtool --decode-sigs" says:
VIRUS NAME: PUA.PDF.OpenActionObject
TARGET TYPE: ANY FILE
OFFSET: 0
DECODED SIGNATURE:
%PDF-{WILDCARD_ANY_