Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file project file 5.16 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-9621
The ELF parser in file 5.16 up to and including 5.21 allows remote malicious users to cause a denial of service via a long string.
File Project File 5.20
File Project File 5.21
File Project File 5.16
File Project File 5.17
File Project File 5.18
File Project File 5.19
NA
CVE-2009-2373
Cross-site scripting (XSS) vulnerability in the Forum module in Drupal 6.x prior to 6.13 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Drupal Drupal 6.3
Drupal Drupal 6.0
Drupal Drupal 5.14
Drupal Drupal 5.16
Drupal Drupal 5.2
Drupal Drupal 5.8
Drupal Drupal 6.8
Drupal Drupal 6.10
Drupal Drupal 6.9
Drupal Drupal 6.12
Drupal Drupal 5.1 Rev1.1
Drupal Drupal 5.13
Drupal Drupal 5.3
Drupal Drupal 5.5.
Drupal Drupal 5.4
Drupal Drupal 5.0
Drupal Drupal 6.6
Drupal Drupal 6.7
Drupal Drupal 6.5
Drupal Drupal 6.4
Drupal Drupal 5.1
Drupal Drupal 5.9
NA
CVE-2010-3092
The upload module in Drupal 5.x prior to 5.23 and 6.x prior to 6.18 does not properly support case-insensitive filename handling in a database configuration, which allows remote authenticated users to bypass the intended restrictions on downloading a file by uploading a different...
Drupal Drupal 5.0
Drupal Drupal 5.10
Drupal Drupal 5.11
Drupal Drupal 5.12
Drupal Drupal 5.13
Drupal Drupal 5.14
Drupal Drupal 5.2
Drupal Drupal 5.3
Drupal Drupal 5.4
Drupal Drupal 5.5
Drupal Drupal 5.19
Drupal Drupal 5.20
Drupal Drupal 5.21
Drupal Drupal 5.22
Drupal Drupal 5.1
Drupal Drupal 5.6
Drupal Drupal 5.8
Drupal Drupal 5.15
Drupal Drupal 5.17
Drupal Drupal 5.7
Drupal Drupal 5.9
Drupal Drupal 5.16
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started