Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 3.30 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2021-38430
FATEK Automation WinProladder versions 3.30 and prior proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code.
Fatek Winproladder
5.3
CVSSv3
CVE-2018-7521
In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file.
Omron Cx-supervisor
NA
CVE-2015-2946
Stack-based buffer overflow in the Open CAD Format Council SXF common library prior to 3.30 allows remote malicious users to execute arbitrary code via a crafted CAD file.
Ocf Sxf Common Library
NA
CVE-2010-4345
Exim 4.72 and previous versions allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
Exim Exim 2.11
Exim Exim 4.70
Exim Exim 4.69
Exim Exim 4.66
Exim Exim 4.10
Exim Exim 3.16
Exim Exim 3.21
Exim Exim 3.01
Exim Exim 3.31
Exim Exim 4.24
Exim Exim 3.33
Exim Exim 3.30
Exim Exim
Exim Exim 4.30
Exim Exim 4.21
Exim Exim 4.03
Exim Exim 4.51
Exim Exim 4.71
Exim Exim 4.67
Exim Exim 4.63
Exim Exim 4.00
Exim Exim 4.43
1 EDB exploit
2 Metasploit modules
2 Nmap scripts
7.8
CVSSv3
CVE-2021-38442
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process.
Fatek Winproladder
NA
CVE-2011-0017
The open_log function in log.c in Exim 4.72 and previous versions does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
Exim Exim 4.43
Exim Exim 4.34
Exim Exim 4.61
Exim Exim 4.60
Exim Exim 4.42
Exim Exim 4.65
Exim Exim 4.32
Exim Exim 4.20
Exim Exim 4.02
Exim Exim 4.01
Exim Exim 3.30
Exim Exim 3.22
Exim Exim 3.12
Exim Exim 3.11
Exim Exim 2.11
Exim Exim 2.10
Exim Exim 4.69
Exim Exim 4.50
Exim Exim 4.44
Exim Exim 4.63
Exim Exim 4.62
Exim Exim 4.21
NA
CVE-2012-5904
Heap-based buffer overflow in IrfanView prior to 4.33 allows remote malicious users to execute arbitrary code via a crafted RLE compressed bitmap file such as a DIB, RLE, or BMP image.
Irfanview Irfanview 4.28
Irfanview Irfanview 4.27
Irfanview Irfanview 3.98
Irfanview Irfanview 3.97
Irfanview Irfanview 3.75
Irfanview Irfanview 3.70
Irfanview Irfanview 3.30
Irfanview Irfanview 3.25
Irfanview Irfanview 3.07
Irfanview Irfanview 3.05
Irfanview Irfanview 2.90
Irfanview Irfanview 2.85
Irfanview Irfanview 2.60
Irfanview Irfanview 2.55
Irfanview Irfanview 2.30
Irfanview Irfanview 2.27
Irfanview Irfanview 2.12
Irfanview Irfanview 2.10
Irfanview Irfanview 2.07
Irfanview Irfanview 1.95
Irfanview Irfanview 1.90
Irfanview Irfanview
NA
CVE-2010-1509
IrfanView prior to 4.27 does not properly handle an unspecified integer variable during processing of PSD images, which allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image file that triggers a heap-...
Irfanview Irfanview
Irfanview Irfanview 4.23
Irfanview Irfanview 3.97
Irfanview Irfanview 3.95
Irfanview Irfanview 3.61
Irfanview Irfanview 3.60
Irfanview Irfanview 3.25
Irfanview Irfanview 3.21
Irfanview Irfanview 3.05
Irfanview Irfanview 3.02
Irfanview Irfanview 2.83
Irfanview Irfanview 2.82
Irfanview Irfanview 2.60
Irfanview Irfanview 2.55
Irfanview Irfanview 2.30
Irfanview Irfanview 2.27
Irfanview Irfanview 2.10
Irfanview Irfanview 2.07
Irfanview Irfanview 1.95
Irfanview Irfanview 1.90
Irfanview Irfanview 4.22
Irfanview Irfanview 4.20
NA
CVE-2012-0897
Stack-based buffer overflow in the JPEG2000 plugin in IrfanView PlugIns prior to 4.33 allows remote malicious users to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment.
Irfanview Irfanview 2.32
Irfanview Irfanview 2.30
Irfanview Irfanview 2.62
Irfanview Irfanview 2.60
Irfanview Irfanview 2.35
Irfanview Irfanview 2.83
Irfanview Irfanview 2.66
Irfanview Irfanview 2.68
Irfanview Irfanview 2.95
Irfanview Irfanview
Irfanview Irfanview 2.22
Irfanview Irfanview 2.20
Irfanview Irfanview 2.50
Irfanview Irfanview 2.40
Irfanview Irfanview 2.80
Irfanview Irfanview 3.99
Irfanview Irfanview 3.02
Irfanview Irfanview 3.05
Irfanview Irfanview 1.90
Irfanview Irfanview 1.95
Irfanview Irfanview 2.10
Irfanview Irfanview 2.12
1 EDB exploit
NA
CVE-2013-5351
Heap-based buffer overflow in IrfanView prior to 4.37 allows remote malicious users to execute arbitrary code via the LZW code stream in a GIF file.
Irfanview Irfanview
Irfanview Irfanview 4.25
Irfanview Irfanview 4.23
Irfanview Irfanview 3.97
Irfanview Irfanview 3.95
Irfanview Irfanview 3.61
Irfanview Irfanview 3.60
Irfanview Irfanview 3.25
Irfanview Irfanview 3.21
Irfanview Irfanview 3.05
Irfanview Irfanview 3.02
Irfanview Irfanview 2.85
Irfanview Irfanview 2.83
Irfanview Irfanview 2.62
Irfanview Irfanview 2.60
Irfanview Irfanview 2.32
Irfanview Irfanview 2.30
Irfanview Irfanview 2.27
Irfanview Irfanview 2.12
Irfanview Irfanview 2.10
Irfanview Irfanview 1.97
Irfanview Irfanview 1.95
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »