Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 4.6 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2004-1304
Stack-based buffer overflow in the ELF header parsing code in file prior to 4.12 allows malicious users to execute arbitrary code via a crafted ELF file.
File File 4.3
File File 4.4
File File 4.1
File File 4.10
File File 4.7
File File 4.8
File File 4.11
File File 4.2
File File 4.9
File File 4.0
File File 4.5
File File 4.6
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Gentoo Linux
Trustix Secure Linux 2.2
1 EDB exploit
942
VMScore
CVE-2017-8759
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an malicious user to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
Microsoft .net Framework 4.6.1
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.5.2
Microsoft .net Framework 4.6
Microsoft .net Framework 2.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.7
1 EDB exploit
24 Github repositories
13 Articles
940
VMScore
CVE-2009-2817
Buffer overflow in Apple iTunes prior to 9.0.1 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted .pls file.
Apple Itunes 2.0.3
Apple Itunes 2.0.2
Apple Itunes 4.0.1
Apple Itunes 4.5.0
Apple Itunes 4.1.0
Apple Itunes 4.7.0
Apple Itunes 6.0.4
Apple Itunes 6.0.3
Apple Itunes 7.3.2
Apple Itunes 7.1.1
Apple Itunes 7.6.2
Apple Itunes 7.7.0
Apple Itunes 1.1.2
Apple Itunes 3.0.1
Apple Itunes 4.2.72
Apple Itunes 4.6.0
Apple Itunes 4.7
Apple Itunes 6.0.2
Apple Itunes 6.0.4.2
Apple Itunes 7.0.2
Apple Itunes 7.3.1
Apple Itunes 7.5.0
2 EDB exploits
890
VMScore
CVE-2012-3358
Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.
Uclouvain Openjpeg 1.5
890
VMScore
CVE-2005-0708
The sendfile system call in FreeBSD 4.8 up to and including 4.11 and 5 up to and including 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote malicious users to obtain sensitive information.
Dragonflybsd Dragonflybsd 1.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 4.8
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Dragonflybsd Dragonflybsd 1.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 5.0
Freebsd Freebsd 5.2.1
Freebsd Freebsd 4.11
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 5.4
Freebsd Freebsd 4.1
Freebsd Freebsd 4.6.2
Freebsd Freebsd 5.2
890
VMScore
CVE-2004-0226
Multiple buffer overflows in Midnight Commander (mc) prior to 4.6.0 may allow malicious users to cause a denial of service or execute arbitrary code.
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Sgi Propack 2.3
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Sgi Propack 2.4
Gentoo Linux 0.5
Gentoo Linux 0.7
Slackware Slackware Linux
Slackware Slackware Linux 9.0
Gentoo Linux 1.4
890
VMScore
CVE-2004-0234
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the o...
Clearswift Mailsweeper 4.0
Clearswift Mailsweeper 4.1
Clearswift Mailsweeper 4.3.4
Clearswift Mailsweeper 4.3.5
F-secure F-secure Anti-virus 4.51
F-secure F-secure Anti-virus 5.41
F-secure F-secure Anti-virus 5.42
F-secure F-secure Internet Security 2003
F-secure F-secure Internet Security 2004
Sgi Propack 2.4
Sgi Propack 3.0
Clearswift Mailsweeper 4.2
Clearswift Mailsweeper 4.3
Clearswift Mailsweeper 4.3.6
Clearswift Mailsweeper 4.3.6 Sp1
Clearswift Mailsweeper 4.3.7
F-secure F-secure Anti-virus 4.52
F-secure F-secure Personal Express 4.5
F-secure F-secure Personal Express 4.6
F-secure F-secure Personal Express 4.7
Stalker Cgpmcafee 3.2
Tsugio Okamoto Lha 1.14
890
VMScore
CVE-2002-0450
Buffer overflow in Talentsoft Web+ 5.0 and previous versions allows remote malicious users to execute arbitrary code via a long Web Markup Language (wml) file name to (1) webplus.dll or (2) webplus.exe.
Talentsoft Web\\+ Server 4.6
Talentsoft Web\\+ Server 5.0
890
VMScore
CVE-2001-0961
Buffer overflow in tab expansion capability of the most program allows local or remote malicious users to execute arbitrary code via a malformed file that is viewed with most.
John E. Davis Most 4.5
John E. Davis Most 4.6
John E. Davis Most 4.7
John E. Davis Most 4.9.0
John E. Davis Most 4.9.1
John E. Davis Most 4.4
John E. Davis Most 4.41
830
VMScore
CVE-2016-10033
The mailSend function in the isMail transport in PHPMailer prior to 5.2.18 might allow remote malicious users to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Phpmailer Project Phpmailer
Wordpress Wordpress
Joomla Joomla\\!
9 EDB exploits
116 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »