Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 4.5 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2010-2600
Untrusted search path vulnerability in BlackBerry Desktop Software prior to 6.0.0.47 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL that is located in the same folder as a file that is processe...
Rim Blackberry Desktop Software 5.0
Rim Blackberry Desktop Software 5.0.1
Rim Blackberry Desktop Software 3.0
Rim Blackberry Desktop Software
Rim Blackberry Desktop Software 4.6
Rim Blackberry Desktop Software 4.5
Rim Blackberry Desktop Software 4.0
Rim Blackberry Desktop Software 4.7
9.3
CVSSv2
CVE-2009-4324
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x prior to 9.3, and 8.x prior to 8.2 on Windows and Mac OS X, allows remote malicious users to execute arbitrary code via a crafted PDF file using ZLib compressed stream...
Adobe Acrobat Reader 3.0
Adobe Acrobat Reader 4.0
Adobe Acrobat Reader 5.0.11
Adobe Acrobat Reader 5.0.5
Adobe Acrobat 6.0.4
Adobe Acrobat 6.0.5
Adobe Acrobat 7.0.6
Adobe Acrobat 7.0.7
Adobe Acrobat Reader 5.1
Adobe Acrobat Reader 6.0
Adobe Acrobat Reader 7.0.2
Adobe Acrobat Reader 7.0.3
Adobe Acrobat Reader 8.0
Adobe Acrobat Reader 8.1
Adobe Acrobat Reader
Adobe Acrobat Reader 4.0.5c
Adobe Acrobat Reader 4.5
Adobe Acrobat Reader 5.0.9
Adobe Acrobat 6.0
Adobe Acrobat 7.0.2
Adobe Acrobat 7.0.3
Adobe Acrobat 8.0
3 EDB exploits
3 Articles
9.3
CVSSv2
CVE-2009-3459
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x prior to 7.1.4, 8.x prior to 8.1.7, and 9.x prior to 9.2 allows remote malicious users to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some...
Adobe Acrobat 5.0
Adobe Acrobat 5.0.10
Adobe Acrobat 6.0.4
Adobe Acrobat 6.0.5
Adobe Acrobat 7.0.7
Adobe Acrobat 7.0.8
Adobe Acrobat 7.0.9
Adobe Acrobat 9.0.0
Adobe Acrobat 9.1
Adobe Acrobat 8.1.6
Adobe Acrobat 4.0
Adobe Acrobat 4.0.5
Adobe Acrobat 6.0
Adobe Acrobat 6.0.1
Adobe Acrobat 7.0.2
Adobe Acrobat 7.0.3
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.2
Adobe Acrobat
Adobe Acrobat 7.0.4
Adobe Acrobat 4.0.5a
Adobe Acrobat 4.0.5c
2 EDB exploits
9.3
CVSSv2
CVE-2009-2817
Buffer overflow in Apple iTunes prior to 9.0.1 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted .pls file.
Apple Itunes 2.0.3
Apple Itunes 2.0.2
Apple Itunes 4.0.1
Apple Itunes 4.5.0
Apple Itunes 4.1.0
Apple Itunes 4.7.0
Apple Itunes 6.0.4
Apple Itunes 6.0.3
Apple Itunes 7.3.2
Apple Itunes 7.1.1
Apple Itunes 7.6.2
Apple Itunes 7.7.0
Apple Itunes 1.1.2
Apple Itunes 3.0.1
Apple Itunes 4.2.72
Apple Itunes 4.6.0
Apple Itunes 4.7
Apple Itunes 6.0.2
Apple Itunes 6.0.4.2
Apple Itunes 7.0.2
Apple Itunes 7.3.1
Apple Itunes 7.5.0
2 EDB exploits
9.3
CVSSv2
CVE-2009-1260
Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and previous versions allow remote malicious users to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.
Ezbsystems Ultraiso 9.2
Ezbsystems Ultraiso 9.1.2
Ezbsystems Ultraiso 8.51
Ezbsystems Ultraiso 8.2
Ezbsystems Ultraiso 7.6
Ezbsystems Ultraiso 7.56
Ezbsystems Ultraiso 7.22 Me
Ezbsystems Ultraiso 7.21 Sr-2
Ezbsystems Ultraiso 7.21 Sr-1
Ezbsystems Ultraiso 6.52
Ezbsystems Ultraiso 6.51
Ezbsystems Ultraiso 5.0
Ezbsystems Ultraiso 5.1
Ezbsystems Ultraiso 9.0
Ezbsystems Ultraiso 8.66
Ezbsystems Ultraiso 8.65
Ezbsystems Ultraiso 8.12
Ezbsystems Ultraiso 8
Ezbsystems Ultraiso 7.55
Ezbsystems Ultraiso 7.52
Ezbsystems Ultraiso 7.1
Ezbsystems Ultraiso 7.0
2 EDB exploits
9.3
CVSSv2
CVE-2008-2992
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and previous versions allows remote malicious users to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
Adobe Acrobat 7.0.8
Adobe Acrobat 7.0.7
Adobe Acrobat 7.0
Adobe Acrobat 6.0.5
Adobe Acrobat 6.0.4
Adobe Acrobat 5.0.10
Adobe Acrobat 5.0
Adobe Acrobat Reader 7.0.1
Adobe Acrobat Reader 7.0
Adobe Acrobat Reader 7.0.4
Adobe Acrobat Reader 7.0.5
Adobe Acrobat Reader
Adobe Acrobat Reader 6.0.2
Adobe Acrobat Reader 6.0.1
Adobe Acrobat Reader 5.0.11
Adobe Acrobat Reader 5.0.10
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1
Adobe Acrobat 7.0.4
Adobe Acrobat 7.0.3
Adobe Acrobat 6.0.1
Adobe Acrobat 6.0
4 EDB exploits
1 Github repository
4 Articles
9.3
CVSSv2
CVE-2008-2042
The Javascript API in Adobe Acrobat Professional 7.0.9 and possibly 8.1.1 exposes a dangerous method, which allows remote malicious users to execute arbitrary commands or trigger a buffer overflow via a crafted PDF file that invokes app.checkForUpdate with a malicious callback fu...
Adobe Acrobat 7.1.1
Adobe Acrobat 7.1.0
Adobe Acrobat 7.0.3
Adobe Acrobat 7.0.2
Adobe Acrobat 7.0.1
Adobe Acrobat 6.0.1
Adobe Acrobat 6.0
Adobe Acrobat 4.0.5
Adobe Acrobat 4.0
Adobe Acrobat 7.1.3
Adobe Acrobat 7.1.2
Adobe Acrobat 7.0.5
Adobe Acrobat 7.0.4
Adobe Acrobat 6.0.3
Adobe Acrobat 6.0.2
Adobe Acrobat 4.0.5c
Adobe Acrobat 4.0.5a
Adobe Acrobat 8.0
Adobe Acrobat 7.1.4
Adobe Acrobat 7.0.7
Adobe Acrobat 7.0.6
Adobe Acrobat 6.0.5
9.3
CVSSv2
CVE-2007-3699
The Decomposer component in multiple Symantec products allows remote malicious users to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header.
Symantec Antivirus Scan Engine 4.0
Symantec Antivirus Scan Engine 4.3.12
Symantec Antivirus Scan Engine 4.3
Symantec Brightmail Antispam 6.0.2
Symantec Brightmail Antispam 6.0.3
Symantec Client Security 2.0.4
Symantec Client Security 2.0.5 Build 1100 Mp1
Symantec Client Security 3.0.1.1007
Symantec Client Security 3.0.1.1008
Symantec Client Security 3.0.2.2021
Symantec Client Security 3.1
Symantec Mail Security 4.0
Symantec Mail Security 4.1
Symantec Mail Security 4.5.4.743
Symantec Mail Security 4.6 Build 97
Symantec Mail Security 5.0.0.204
Symantec Norton Antivirus 10.0.0.359
Symantec Norton Antivirus 10.0.0
Symantec Norton Antivirus 10.0.2.2010
Symantec Norton Antivirus 10.0.2.2011
Symantec Norton Antivirus 10.1.4.4010
Symantec Norton Antivirus 10.1.4
9.3
CVSSv2
CVE-2006-5857
Adobe Reader and Acrobat 7.0.8 and previous versions allows user-assisted remote malicious users to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering.
Adobe Acrobat Reader
Adobe Acrobat Reader 7.0.7
Adobe Acrobat Reader 7.0
Adobe Acrobat Reader 6.0.5
Adobe Acrobat Reader 5.0.7
Adobe Acrobat Reader 5.0.6
Adobe Acrobat Reader 4.0.5a
Adobe Acrobat Reader 4.0.5
Adobe Acrobat 7.0.3
Adobe Acrobat 7.0.2
Adobe Acrobat 6.0
Adobe Acrobat 5.0.6
Adobe Acrobat 4.0
Adobe Acrobat 3.1
Adobe Acrobat Reader 7.0.6
Adobe Acrobat Reader 7.0.5
Adobe Acrobat Reader 6.0.4
Adobe Acrobat Reader 6.0.3
Adobe Acrobat Reader 5.0.5
Adobe Acrobat Reader 5.0.11
Adobe Acrobat Reader 4.0
Adobe Acrobat Reader 3.0
7.8
CVSSv2
CVE-2014-2380
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 up to and including 5.5 uses weak encryption, which allows remote malicious users to obtain sensitive information by reading a credential file.
Invensys Wonderware Information Server 4.0
Invensys Wonderware Information Server 5.5
Invensys Wonderware Information Server 5.0
Invensys Wonderware Information Server 4.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »