Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 3.28 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
File File 3.30
File File 3.32
File File 3.28
File File 3.37
File File 3.39
File File 3.40
File File 3.33
File File 3.34
File File 3.35
File File 3.36
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
2 EDB exploits
7.5
CVSSv2
CVE-2003-1092
Unknown vulnerability in the "Automatic File Content Type Recognition (AFCTR) Tool version of the file package prior to 3.41, related to "a memory allocation problem," has unknown impact.
Christos Zoulas File 1 3.35
Christos Zoulas File 1 3.36
Christos Zoulas File 1 3.33
Christos Zoulas File 1 3.34
Christos Zoulas File 1 3.28
Christos Zoulas File 1 3.37
Christos Zoulas File 1 3.39
Christos Zoulas File 1 3.30
Christos Zoulas File 1 3.32
Christos Zoulas File 1 3.40
1 EDB exploit
6.8
CVSSv2
CVE-2013-4885
The http-domino-enum-passwords.nse script in NMap prior to 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.
Nmap Nmap
Nmap Nmap 6.20
Nmap Nmap 5.59
Nmap Nmap 5.50
Nmap Nmap 5.00
Nmap Nmap 4.90
Nmap Nmap 4.85
Nmap Nmap 4.60
Nmap Nmap 4.53
Nmap Nmap 4.49
Nmap Nmap 4.22
Nmap Nmap 4.20
Nmap Nmap 4.02
Nmap Nmap 4.01
Nmap Nmap 3.95
Nmap Nmap 3.94
Nmap Nmap 3.75
Nmap Nmap 3.70
Nmap Nmap 3.55
Nmap Nmap 3.40
Nmap Nmap 3.25
Nmap Nmap 3.20
1 EDB exploit
5
CVSSv2
CVE-2013-6809
Format string vulnerability in the client in Tftpd32 prior to 4.50 allows remote servers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the Remote File field.
Philippe Jounin Tftpd32 3.50
Philippe Jounin Tftpd32 3.35
Philippe Jounin Tftpd32 3.26
Philippe Jounin Tftpd32 2.54
Philippe Jounin Tftpd32 3.00
Philippe Jounin Tftpd32 2.84
Philippe Jounin Tftpd32 2.72
Philippe Jounin Tftpd32 2.71
Philippe Jounin Tftpd32 2.21
Philippe Jounin Tftpd32 2.11
Philippe Jounin Tftpd32 2.2
Philippe Jounin Tftpd32
Philippe Jounin Tftpd32 3.51
Philippe Jounin Tftpd32 3.28
Philippe Jounin Tftpd32 3.27
Philippe Jounin Tftpd32 3.02
Philippe Jounin Tftpd32 3.01
Philippe Jounin Tftpd32 2.74
Philippe Jounin Tftpd32 2.73
Philippe Jounin Tftpd32 2.52
Philippe Jounin Tftpd32 2.51
Philippe Jounin Tftpd32 3.31
6.8
CVSSv2
CVE-2020-16234
In PLC WinProladder Version 3.28 and prior, a stack-based buffer overflow vulnerability can be exploited when a valid user opens a specially crafted file, which may allow an malicious user to remotely execute arbitrary code.
Fatek Winproladder
6.8
CVSSv2
CVE-2019-11460
An issue exists in GNOME gnome-desktop 3.26, 3.28, and 3.30 before 3.30.2.2, and 3.32 before 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer...
Gnome Gnome-desktop 3.28.0
Gnome Gnome-desktop 3.26.0
Gnome Gnome-desktop
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started