Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 3.37 vulnerabilities and exploits
(subscribe to this query)
470
VMScore
CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
File File 3.33
File File 3.28
File File 3.35
File File 3.30
File File 3.36
File File 3.39
File File 3.40
File File 3.32
File File 3.34
File File 3.37
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
2 EDB exploits
755
VMScore
CVE-2003-1092
Unknown vulnerability in the "Automatic File Content Type Recognition (AFCTR) Tool version of the file package prior to 3.41, related to "a memory allocation problem," has unknown impact.
Christos Zoulas File 1 3.36
Christos Zoulas File 1 3.30
Christos Zoulas File 1 3.34
Christos Zoulas File 1 3.32
Christos Zoulas File 1 3.35
Christos Zoulas File 1 3.33
Christos Zoulas File 1 3.28
Christos Zoulas File 1 3.37
Christos Zoulas File 1 3.39
Christos Zoulas File 1 3.40
1 EDB exploit
828
VMScore
CVE-2009-3930
Multiple integer overflows in Christos Zoulas file prior to 5.02 allow user-assisted remote malicious users to have an unspecified impact via a malformed compound document (aka cdf) file that triggers a buffer overflow.
Christos Zoulas File 5.00
Christos Zoulas File 4.19
Christos Zoulas File 4.08
Christos Zoulas File 3.32
Christos Zoulas File 4.04
Christos Zoulas File 3.41
Christos Zoulas File 4.26
Christos Zoulas File 4.02
Christos Zoulas File 4.17
Christos Zoulas File 4.11
Christos Zoulas File 3.34
Christos Zoulas File 3.38
Christos Zoulas File 3.39
Christos Zoulas File 4.03
Christos Zoulas File 4.06
Christos Zoulas File 4.20
Christos Zoulas File 4.09
Christos Zoulas File 3.37
Christos Zoulas File 4.14
Christos Zoulas File 4.13
Christos Zoulas File 3.40
Christos Zoulas File 4.23
668
VMScore
CVE-2004-1403
PHP remote file inclusion vulnerability in index.php in GNUBoard 3.39 and previous versions allows remote malicious users to execute arbitrary PHP code by modifying the doc parameter to reference a URL on a remote web server that contains the code.
Sir Gnuboard 3.37
Sir Gnuboard 3.31
Sir Gnuboard 3.32
Sir Gnuboard 3.39
Sir Gnuboard 3.38
Sir Gnuboard 3.34
Sir Gnuboard 3.35
Sir Gnuboard 3.33
Sir Gnuboard 3.30
Sir Gnuboard 3.36
NA
CVE-2023-33979
gpt_academic provides a graphical interface for ChatGPT/GLM. A vulnerability was found in gpt_academic 3.37 and prior. This issue affects some unknown processing of the component Configuration File Handler. The manipulation of the argument file leads to information disclosure. Si...
Gpt Academic Project Gpt Academic
NA
CVE-2021-46174
Heap-based Buffer Overflow in function bfd_getl32 in Binutils objdump 3.37.
Gnu Binutils
NA
CVE-2022-48064
GNU Binutils prior to 2.40 exists to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.
Gnu Binutils
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Netapp Ontap Select Deploy Administration Utility -
NA
CVE-2022-35205
An issue exists in Binutils readelf 2.38.50, reachable assertion failure in function display_debug_names allows malicious users to cause a denial of service.
Gnu Binutils 2.38.50
NA
CVE-2022-47007
An issue exists function stab_demangle_v3_arg in stabs.c in Binutils 2.34 thru 2.38, allows malicious users to cause a denial of service due to memory leaks.
Gnu Binutils
NA
CVE-2022-47008
An issue exists function make_tempdir, and make_tempname in bucomm.c in Binutils 2.34 thru 2.38, allows malicious users to cause a denial of service due to memory leaks.
Gnu Binutils
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »