Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 4.6 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2012-3358
Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.
Uclouvain Openjpeg 1.5
10
CVSSv2
CVE-2005-0708
The sendfile system call in FreeBSD 4.8 up to and including 4.11 and 5 up to and including 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote malicious users to obtain sensitive information.
Dragonflybsd Dragonflybsd 1.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 4.8
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Dragonflybsd Dragonflybsd 1.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 5.0
Freebsd Freebsd 5.2.1
Freebsd Freebsd 4.11
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 5.4
Freebsd Freebsd 4.1
Freebsd Freebsd 4.6.2
Freebsd Freebsd 5.2
10
CVSSv2
CVE-2004-1304
Stack-based buffer overflow in the ELF header parsing code in file prior to 4.12 allows malicious users to execute arbitrary code via a crafted ELF file.
File File 4.3
File File 4.4
File File 4.1
File File 4.10
File File 4.7
File File 4.8
File File 4.11
File File 4.2
File File 4.9
File File 4.0
File File 4.5
File File 4.6
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Gentoo Linux
Trustix Secure Linux 2.2
1 EDB exploit
10
CVSSv2
CVE-2004-0226
Multiple buffer overflows in Midnight Commander (mc) prior to 4.6.0 may allow malicious users to cause a denial of service or execute arbitrary code.
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Sgi Propack 2.3
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Sgi Propack 2.4
Gentoo Linux 0.5
Gentoo Linux 0.7
Slackware Slackware Linux
Slackware Slackware Linux 9.0
Gentoo Linux 1.4
10
CVSSv2
CVE-2004-0234
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the o...
Clearswift Mailsweeper 4.0
Clearswift Mailsweeper 4.1
Clearswift Mailsweeper 4.3.4
Clearswift Mailsweeper 4.3.5
F-secure F-secure Anti-virus 4.51
F-secure F-secure Anti-virus 5.41
F-secure F-secure Anti-virus 5.42
F-secure F-secure Internet Security 2003
F-secure F-secure Internet Security 2004
Sgi Propack 2.4
Sgi Propack 3.0
Clearswift Mailsweeper 4.2
Clearswift Mailsweeper 4.3
Clearswift Mailsweeper 4.3.6
Clearswift Mailsweeper 4.3.6 Sp1
Clearswift Mailsweeper 4.3.7
F-secure F-secure Anti-virus 4.52
F-secure F-secure Personal Express 4.5
F-secure F-secure Personal Express 4.6
F-secure F-secure Personal Express 4.7
Stalker Cgpmcafee 3.2
Tsugio Okamoto Lha 1.14
10
CVSSv2
CVE-2002-0450
Buffer overflow in Talentsoft Web+ 5.0 and previous versions allows remote malicious users to execute arbitrary code via a long Web Markup Language (wml) file name to (1) webplus.dll or (2) webplus.exe.
Talentsoft Web\\+ Server 4.6
Talentsoft Web\\+ Server 5.0
10
CVSSv2
CVE-2001-0961
Buffer overflow in tab expansion capability of the most program allows local or remote malicious users to execute arbitrary code via a malformed file that is viewed with most.
John E. Davis Most 4.5
John E. Davis Most 4.6
John E. Davis Most 4.7
John E. Davis Most 4.9.0
John E. Davis Most 4.9.1
John E. Davis Most 4.4
John E. Davis Most 4.41
9.3
CVSSv2
CVE-2019-8846
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to ar...
Apple Icloud
Apple Itunes
Apple Safari
Apple Ipados
Apple Iphone Os
Apple Tvos
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Workstation 7.0
2 Articles
9.3
CVSSv2
CVE-2019-8835
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may ...
Apple Icloud
Apple Itunes
Apple Safari
Apple Ipados
Apple Iphone Os
Apple Tvos
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Workstation 7.0
2 Articles
9.3
CVSSv2
CVE-2019-8844
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted w...
Apple Icloud
Apple Itunes
Apple Safari
Apple Ipados
Apple Iphone Os
Apple Tvos
Apple Watchos
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Workstation 7.0
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »