Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 3.32 vulnerabilities and exploits
(subscribe to this query)
470
VMScore
CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
File File 3.30
File File 3.32
File File 3.28
File File 3.37
File File 3.39
File File 3.40
File File 3.33
File File 3.34
File File 3.35
File File 3.36
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
2 EDB exploits
755
VMScore
CVE-2003-1092
Unknown vulnerability in the "Automatic File Content Type Recognition (AFCTR) Tool version of the file package prior to 3.41, related to "a memory allocation problem," has unknown impact.
Christos Zoulas File 1 3.35
Christos Zoulas File 1 3.36
Christos Zoulas File 1 3.33
Christos Zoulas File 1 3.34
Christos Zoulas File 1 3.28
Christos Zoulas File 1 3.37
Christos Zoulas File 1 3.39
Christos Zoulas File 1 3.30
Christos Zoulas File 1 3.32
Christos Zoulas File 1 3.40
1 EDB exploit
828
VMScore
CVE-2009-3930
Multiple integer overflows in Christos Zoulas file prior to 5.02 allow user-assisted remote malicious users to have an unspecified impact via a malformed compound document (aka cdf) file that triggers a buffer overflow.
Christos Zoulas File 5.00
Christos Zoulas File 4.26
Christos Zoulas File 4.17
Christos Zoulas File 4.16
Christos Zoulas File 4.15
Christos Zoulas File 4.07
Christos Zoulas File 4.06
Christos Zoulas File 3.39
Christos Zoulas File 3.38
Christos Zoulas File
Christos Zoulas File 4.23
Christos Zoulas File 4.21
Christos Zoulas File 4.12
Christos Zoulas File 4.11
Christos Zoulas File 4.02
Christos Zoulas File 4.01
Christos Zoulas File 3.34
Christos Zoulas File 3.33
Christos Zoulas File 4.20
Christos Zoulas File 4.19
Christos Zoulas File 4.09
Christos Zoulas File 4.08
668
VMScore
CVE-2004-1403
PHP remote file inclusion vulnerability in index.php in GNUBoard 3.39 and previous versions allows remote malicious users to execute arbitrary PHP code by modifying the doc parameter to reference a URL on a remote web server that contains the code.
Sir Gnuboard 3.36
Sir Gnuboard 3.37
Sir Gnuboard 3.32
Sir Gnuboard 3.33
Sir Gnuboard 3.30
Sir Gnuboard 3.31
Sir Gnuboard 3.38
Sir Gnuboard 3.39
Sir Gnuboard 3.34
Sir Gnuboard 3.35
605
VMScore
CVE-2013-4986
Stack-based buffer overflow in PDFAX0722_IconCool.dll 7.22.1125.2121 in IconCool PDFCool Studio 3.32 Build 130330 and previous versions allows remote malicious users to execute arbitrary code via a crafted PDF file.
Iconcool Pdfcool Studio
Iconcool Pdfcool Studio 2.40
Iconcool Pdfcool Studio 2.30
Iconcool Pdfcool Studio 2.26
Iconcool Pdfcool Studio 2.24
Iconcool Pdfcool Studio 2.5
Iconcool Pdfcool Studio 2.7
Iconcool Pdfcool Studio 2.20
Iconcool Pdfcool Studio 2.14
Iconcool Pdfcool Studio 2.0
Iconcool Pdfcool Studio 3.0
Iconcool Pdfcool Studio 2.10
Iconcool Pdfcool Studio 2.8
Iconcool Pdfcool Studio 2.6
Iconcool Pdfcool Studio 2.16
Iconcool Pdfcool Studio 2.12
805
VMScore
CVE-2010-4345
Exim 4.72 and previous versions allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
Exim Exim 2.11
Exim Exim 4.70
Exim Exim 4.69
Exim Exim 4.66
Exim Exim 4.10
Exim Exim 3.16
Exim Exim 3.21
Exim Exim 3.01
Exim Exim 3.31
Exim Exim 4.24
Exim Exim 3.33
Exim Exim 3.30
Exim Exim
Exim Exim 4.30
Exim Exim 4.21
Exim Exim 4.03
Exim Exim 4.51
Exim Exim 4.71
Exim Exim 4.67
Exim Exim 4.63
Exim Exim 4.00
Exim Exim 4.43
1 EDB exploit
2 Metasploit modules
2 Nmap scripts
614
VMScore
CVE-2011-0017
The open_log function in log.c in Exim 4.72 and previous versions does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
Exim Exim 4.43
Exim Exim 4.34
Exim Exim 4.61
Exim Exim 4.60
Exim Exim 4.42
Exim Exim 4.65
Exim Exim 4.32
Exim Exim 4.20
Exim Exim 4.02
Exim Exim 4.01
Exim Exim 3.30
Exim Exim 3.22
Exim Exim 3.12
Exim Exim 3.11
Exim Exim 2.11
Exim Exim 2.10
Exim Exim 4.69
Exim Exim 4.50
Exim Exim 4.44
Exim Exim 4.63
Exim Exim 4.62
Exim Exim 4.21
605
VMScore
CVE-2019-11460
An issue exists in GNOME gnome-desktop 3.26, 3.28, and 3.30 before 3.30.2.2, and 3.32 before 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer...
Gnome Gnome-desktop 3.28.0
Gnome Gnome-desktop 3.26.0
Gnome Gnome-desktop
828
VMScore
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.51 J
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite Gold
Trend Micro Interscan Viruswall 3.6
Trend Micro Interscan Viruswall 3.6.0 Build 1182
Trend Micro Interscan Viruswall 3.6.0 Build1166
Trend Micro Interscan Viruswall 3.8.0 Build1130
Trend Micro Interscan Viruswall 3.81
Trend Micro Interscan Viruswall For Windows Nt 3.4
Trend Micro Interscan Viruswall For Windows Nt 3.5
Trend Micro Interscan Web Security Suite
Trend Micro Interscan Web Security Suite Gold
Trend Micro Officescan 3.0
Trend Micro Officescan 4.5.0
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 3.5
Trend Micro Control Manager 2.5.0
Trend Micro Control Manager 3.5
Trend Micro Interscan Emanager 3.5
Trend Micro Interscan Emanager 3.51
Trend Micro Interscan Messaging Security Suite 5.5 Build 1183
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started