Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 3.40 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
File File 3.30
File File 3.32
File File 3.28
File File 3.37
File File 3.39
File File 3.40
File File 3.33
File File 3.34
File File 3.35
File File 3.36
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
2 EDB exploits
NA
CVE-2003-1092
Unknown vulnerability in the "Automatic File Content Type Recognition (AFCTR) Tool version of the file package prior to 3.41, related to "a memory allocation problem," has unknown impact.
Christos Zoulas File 1 3.35
Christos Zoulas File 1 3.36
Christos Zoulas File 1 3.33
Christos Zoulas File 1 3.34
Christos Zoulas File 1 3.28
Christos Zoulas File 1 3.37
Christos Zoulas File 1 3.39
Christos Zoulas File 1 3.30
Christos Zoulas File 1 3.32
Christos Zoulas File 1 3.40
1 EDB exploit
NA
CVE-2009-3930
Multiple integer overflows in Christos Zoulas file prior to 5.02 allow user-assisted remote malicious users to have an unspecified impact via a malformed compound document (aka cdf) file that triggers a buffer overflow.
Christos Zoulas File 5.00
Christos Zoulas File 4.26
Christos Zoulas File 4.17
Christos Zoulas File 4.16
Christos Zoulas File 4.15
Christos Zoulas File 4.07
Christos Zoulas File 4.06
Christos Zoulas File 3.39
Christos Zoulas File 3.38
Christos Zoulas File
Christos Zoulas File 4.23
Christos Zoulas File 4.21
Christos Zoulas File 4.12
Christos Zoulas File 4.11
Christos Zoulas File 4.02
Christos Zoulas File 4.01
Christos Zoulas File 3.34
Christos Zoulas File 3.33
Christos Zoulas File 4.20
Christos Zoulas File 4.19
Christos Zoulas File 4.09
Christos Zoulas File 4.08
NA
CVE-2004-1254
WinRAR 3.40, and possibly earlier versions, allows remote malicious users to execute arbitrary code via a ZIP file containing a file with a long filename, possibly causing an integer overflow that leads to a buffer overflow.
Rarlab Winrar 3.10 Beta3
Rarlab Winrar 3.10 Beta5
Rarlab Winrar 3.0.0
Rarlab Winrar 3.10
Rarlab Winrar 3.40
Rarlab Winrar 3.41
Rarlab Winrar 3.11
Rarlab Winrar 3.20
1 EDB exploit
NA
CVE-2005-0331
Directory traversal vulnerability in WinRAR 3.42 and previous versions, when the user clicks on the ZIP file to extract it, allows remote malicious users to create arbitrary files via a ... (triple dot) in the filename of the ZIP file.
Rarlab Winrar 3.0.0
Rarlab Winrar 3.41
Rarlab Winrar 3.42
Rarlab Winrar 3.20
Rarlab Winrar 3.40
Rarlab Winrar 3.10 Beta5
Rarlab Winrar 3.11
Rarlab Winrar 3.10
Rarlab Winrar 3.10 Beta3
NA
CVE-2004-1540
ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote malicious users to reset the router configuration file.
Zyxel Prestige 645r A1
Zyxel Prestige 650h
Zyxel Prestige 650hw
Zyxel Prestige 650hw 31
Zyxel Prestige 650r
Zyxel Zynos 3.40
Zyxel Zynos Is.3
Zyxel Zynos Is.5
1 EDB exploit
NA
CVE-2005-3263
Stack-based buffer overflow in UNACEV2.DLL for RARLAB WinRAR 2.90 up to and including 3.50 allows remote malicious users to execute arbitrary code via an ACE archive containing a file with a long name.
Rarlab Winrar 3.11
Rarlab Winrar 3.20
Rarlab Winrar 3.40
Rarlab Winrar 3.41
Rarlab Winrar 3.0.0
Rarlab Winrar 3.10 Beta3
Rarlab Winrar 3.50
Rarlab Winrar 2.90
Rarlab Winrar 3.10
Rarlab Winrar 3.10 Beta5
Rarlab Winrar 3.42
NA
CVE-2005-3262
Format string vulnerability in RARLAB WinRAR 2.90 up to and including 3.50 allows remote malicious users to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename.
Rarlab Winrar 2.90
Rarlab Winrar 3.0.0
Rarlab Winrar 3.10
Rarlab Winrar 3.10 Beta3
Rarlab Winrar 3.10 Beta5
Rarlab Winrar 3.20
Rarlab Winrar 3.41
Rarlab Winrar 3.42
Rarlab Winrar 3.50
Rarlab Winrar 3.11
Rarlab Winrar 3.40
1 EDB exploit
NA
CVE-2010-3162
Untrusted search path vulnerability in Apsaly prior to 3.74 allows local users to gain privileges via a Trojan horse executable file in the current working directory.
Masahiko Watanabe Apsaly 1.20
Masahiko Watanabe Apsaly 1.40
Masahiko Watanabe Apsaly 2.00
Masahiko Watanabe Apsaly 2.10
Masahiko Watanabe Apsaly 2.20
Masahiko Watanabe Apsaly 2.40
Masahiko Watanabe Apsaly 3.40
Masahiko Watanabe Apsaly
Masahiko Watanabe Apsaly 2.60
Masahiko Watanabe Apsaly 2.70
Masahiko Watanabe Apsaly 2.72
Masahiko Watanabe Apsaly 3.00
Masahiko Watanabe Apsaly 2.30
Masahiko Watanabe Apsaly 2.50
Masahiko Watanabe Apsaly 3.10
Masahiko Watanabe Apsaly 3.60
NA
CVE-2013-4885
The http-domino-enum-passwords.nse script in NMap prior to 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.
Nmap Nmap
Nmap Nmap 6.20
Nmap Nmap 5.59
Nmap Nmap 5.50
Nmap Nmap 5.00
Nmap Nmap 4.90
Nmap Nmap 4.85
Nmap Nmap 4.60
Nmap Nmap 4.53
Nmap Nmap 4.49
Nmap Nmap 4.22
Nmap Nmap 4.20
Nmap Nmap 4.02
Nmap Nmap 4.01
Nmap Nmap 3.95
Nmap Nmap 3.94
Nmap Nmap 3.75
Nmap Nmap 3.70
Nmap Nmap 3.55
Nmap Nmap 3.40
Nmap Nmap 3.25
Nmap Nmap 3.20
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »