Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 3.39 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
File File 3.30
File File 3.32
File File 3.28
File File 3.37
File File 3.39
File File 3.40
File File 3.33
File File 3.34
File File 3.35
File File 3.36
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
2 EDB exploits
7.5
CVSSv2
CVE-2003-1092
Unknown vulnerability in the "Automatic File Content Type Recognition (AFCTR) Tool version of the file package prior to 3.41, related to "a memory allocation problem," has unknown impact.
Christos Zoulas File 1 3.35
Christos Zoulas File 1 3.36
Christos Zoulas File 1 3.33
Christos Zoulas File 1 3.34
Christos Zoulas File 1 3.28
Christos Zoulas File 1 3.37
Christos Zoulas File 1 3.39
Christos Zoulas File 1 3.30
Christos Zoulas File 1 3.32
Christos Zoulas File 1 3.40
1 EDB exploit
9.3
CVSSv2
CVE-2009-3930
Multiple integer overflows in Christos Zoulas file prior to 5.02 allow user-assisted remote malicious users to have an unspecified impact via a malformed compound document (aka cdf) file that triggers a buffer overflow.
Christos Zoulas File 5.00
Christos Zoulas File 4.26
Christos Zoulas File 4.17
Christos Zoulas File 4.16
Christos Zoulas File 4.15
Christos Zoulas File 4.07
Christos Zoulas File 4.06
Christos Zoulas File 3.39
Christos Zoulas File 3.38
Christos Zoulas File
Christos Zoulas File 4.23
Christos Zoulas File 4.21
Christos Zoulas File 4.12
Christos Zoulas File 4.11
Christos Zoulas File 4.02
Christos Zoulas File 4.01
Christos Zoulas File 3.34
Christos Zoulas File 3.33
Christos Zoulas File 4.20
Christos Zoulas File 4.19
Christos Zoulas File 4.09
Christos Zoulas File 4.08
7.5
CVSSv2
CVE-2004-1403
PHP remote file inclusion vulnerability in index.php in GNUBoard 3.39 and previous versions allows remote malicious users to execute arbitrary PHP code by modifying the doc parameter to reference a URL on a remote web server that contains the code.
Sir Gnuboard 3.36
Sir Gnuboard 3.37
Sir Gnuboard 3.32
Sir Gnuboard 3.33
Sir Gnuboard 3.30
Sir Gnuboard 3.31
Sir Gnuboard 3.38
Sir Gnuboard 3.39
Sir Gnuboard 3.34
Sir Gnuboard 3.35
NA
CVE-2023-3155
The WordPress Gallery Plugin WordPress plugin prior to 3.39 is vulnerable to Arbitrary File Read and Delete due to a lack of input parameter validation in the `gallery_edit` function, allowing an malicious user to access arbitrary resources on the server.
Imagely Nextgen Gallery
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started