Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 3.28 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
File File 3.33
File File 3.28
File File 3.35
File File 3.30
File File 3.36
File File 3.39
File File 3.40
File File 3.32
File File 3.34
File File 3.37
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
2 EDB exploits
NA
CVE-2003-1092
Unknown vulnerability in the "Automatic File Content Type Recognition (AFCTR) Tool version of the file package prior to 3.41, related to "a memory allocation problem," has unknown impact.
Christos Zoulas File 1 3.36
Christos Zoulas File 1 3.30
Christos Zoulas File 1 3.34
Christos Zoulas File 1 3.32
Christos Zoulas File 1 3.35
Christos Zoulas File 1 3.33
Christos Zoulas File 1 3.28
Christos Zoulas File 1 3.37
Christos Zoulas File 1 3.39
Christos Zoulas File 1 3.40
1 EDB exploit
NA
CVE-2013-4885
The http-domino-enum-passwords.nse script in NMap prior to 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.
Nmap Nmap 3.27
Nmap Nmap 3.40
Nmap Nmap 3.30
Nmap Nmap 3.98
Nmap Nmap 2.51
Nmap Nmap 2.12
Nmap Nmap 4.85
Nmap Nmap 4.22
Nmap Nmap 2.52
Nmap Nmap 5.59
Nmap Nmap 5.51
Nmap Nmap 3.10
Nmap Nmap 5.00
Nmap Nmap 2.3
Nmap Nmap 2.54
Nmap Nmap 4.20
Nmap Nmap 4.10
Nmap Nmap 3.94
Nmap Nmap 5.10
Nmap Nmap 3.91
Nmap Nmap 4.49
Nmap Nmap 2.2
1 EDB exploit
NA
CVE-2013-6809
Format string vulnerability in the client in Tftpd32 prior to 4.50 allows remote servers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the Remote File field.
Philippe Jounin Tftpd32 3.02
Philippe Jounin Tftpd32 3.51
Philippe Jounin Tftpd32 3.50
Philippe Jounin Tftpd32 2.81
Philippe Jounin Tftpd32 2.71
Philippe Jounin Tftpd32 2.70
Philippe Jounin Tftpd32 1.1
Philippe Jounin Tftpd32 3.28
Philippe Jounin Tftpd32 2.53
Philippe Jounin Tftpd32 3.00
Philippe Jounin Tftpd32 2.54
Philippe Jounin Tftpd32 2.21
Philippe Jounin Tftpd32 3.31
Philippe Jounin Tftpd32 2.60
Philippe Jounin Tftpd32 3.33
Philippe Jounin Tftpd32 1.0
Philippe Jounin Tftpd32 3.10
Philippe Jounin Tftpd32 3.20
Philippe Jounin Tftpd32 3.22
Philippe Jounin Tftpd32 2.74
Philippe Jounin Tftpd32 3.03
Philippe Jounin Tftpd32 2.84
7.8
CVSSv3
CVE-2020-16234
In PLC WinProladder Version 3.28 and prior, a stack-based buffer overflow vulnerability can be exploited when a valid user opens a specially crafted file, which may allow an malicious user to remotely execute arbitrary code.
Fatek Winproladder
9
CVSSv3
CVE-2019-11460
An issue exists in GNOME gnome-desktop 3.26, 3.28, and 3.30 before 3.30.2.2, and 3.32 before 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer...
Gnome Gnome-desktop 3.28.0
Gnome Gnome-desktop 3.26.0
Gnome Gnome-desktop
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started