Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 4.8 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2009-4809
Directory traversal vulnerability in thumbnail.ghp in Easy File Sharing (EFS) Web Server 4.8 allows remote malicious users to read arbitrary files via a .. (dot dot) in the vfolder parameter.
Sharing-file Easy File Sharing Web Server 4.8
10
CVSSv2
CVE-2004-1304
Stack-based buffer overflow in the ELF header parsing code in file prior to 4.12 allows malicious users to execute arbitrary code via a crafted ELF file.
File File 4.3
File File 4.4
File File 4.1
File File 4.10
File File 4.7
File File 4.8
File File 4.11
File File 4.2
File File 4.9
File File 4.0
File File 4.5
File File 4.6
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Gentoo Linux
Trustix Secure Linux 2.2
1 EDB exploit
5
CVSSv2
CVE-2016-1561
ExaGrid appliances with firmware prior to 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote malicious users to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image.
Exagrid Ex3000 Firmware 4.8
Exagrid Ex5000 Firmware 4.8
Exagrid Ex7000 Firmware 4.8
Exagrid Ex10000e Firmware 4.8
Exagrid Ex13000e Firmware 4.8
Exagrid Ex21000e Firmware 4.8
Exagrid Ex32000e Firmware 4.8
Exagrid Ex40000e Firmware 4.8
1 EDB exploit
7.5
CVSSv2
CVE-2019-19595
reset/modules/advanced_form_maker_edit/multiupload/upload.php in the RESET.PRO Adobe Stock API integration 4.8 for PrestaShop allows remote malicious users to execute arbitrary code by uploading a .php file.
Adobe Stock Api Integration 4.8
Prestashop Prestashop 1.6
Prestashop Prestashop 1.7
7.5
CVSSv2
CVE-2019-19594
reset/modules/fotoliaFoto/multi_upload.php in the RESET.PRO Adobe Stock API Integration for PrestaShop 1.6 and 1.7 allows remote malicious users to execute arbitrary code by uploading a .php file.
Adobe Stock Api Integration 4.8
Prestashop Prestashop 1.6
Prestashop Prestashop 1.7
6.5
CVSSv2
CVE-2008-1657
OpenSSH 4.4 up to versions prior to 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
Openbsd Openssh 4.4
Openbsd Openssh 4.4p1
Openbsd Openssh 4.5
Openbsd Openssh 4.6
Openbsd Openssh 4.7
Openbsd Openssh 4.8
1 Github repository
2.1
CVSSv2
CVE-2019-1142
An elevation of privilege vulnerability exists when the .NET Framework common language runtime (CLR) allows file creation in arbitrary locations, aka '.NET Framework Elevation of Privilege Vulnerability'.
Microsoft .net Framework 3.5
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.6.1
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.6
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.8
Microsoft .net Framework 4.5.2
1 Article
5
CVSSv2
CVE-2002-0874
Vulnerability in Interchange 4.8.6, 4.8.3, and other versions, when running in INET mode, allows remote malicious users to read arbitrary files.
Redhat Interchange 4.8.5
Redhat Interchange 4.8.1
Redhat Interchange 4.8.2
Redhat Interchange 4.8.3
Redhat Interchange 4.8.4
1 EDB exploit
NA
CVE-2023-36049
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
Microsoft .net Framework 2.0
Microsoft .net Framework 3.0
Microsoft .net Framework 3.5
Microsoft .net Framework 4.6.2
Microsoft .net Framework 4.7
Microsoft .net Framework 4.7.1
Microsoft .net Framework 4.7.2
Microsoft .net Framework 4.8
Microsoft .net Framework 4.8.1
Microsoft .net Framework 3.5.1
Microsoft .net 8.0.0
Microsoft .net
Microsoft Visual Studio 2022
5
CVSSv2
CVE-2015-6940
The GetResource servlet in Pentaho Business Analytics (BA) Suite 4.5.x, 4.8.x, and 5.0.x up to and including 5.2.x and Pentaho Data Integration (PDI) Suite 4.3.x, 4.4.x, and 5.0.x up to and including 5.2.x does not restrict access to files in the pentaho-solutions/system folder, ...
Pentaho Data Integration 4.3
Pentaho Data Integration 5.1
Pentaho Data Integration 5.2
Pentaho Data Integration 4.4
Pentaho Data Integration 5.0
Pentaho Business Analytics 4.8
Pentaho Business Analytics 5.0
Pentaho Business Analytics 4.5
Pentaho Business Analytics 5.1
Pentaho Business Analytics 5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »