Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 4.2 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2001-0203
Watchguard Firebox II firewall allows users with read-only access to gain read-write access, and administrative privileges, by accessing a file that contains hashed passphrases, and using the hashes during authentication.
Watchguard Firebox Ii 4.1
Watchguard Firebox Ii 4.2
Watchguard Firebox Ii 4.3
Watchguard Firebox Ii 4.0
Watchguard Firebox Ii 4.4
Watchguard Firebox Ii 4.5
10
CVSSv2
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
1 EDB exploit
10
CVSSv2
CVE-2000-0353
Pine 4.x allows a remote malicious user to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine.
University Of Washington Pine 4.2
University Of Washington Pine 4.0
University Of Washington Pine 3.98
University Of Washington Pine 4.10
10
CVSSv2
CVE-1999-1405
snap command in AIX prior to 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /tmp/ibmsupt/general/passwd be...
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Ibm Aix 3.2.5
Ibm Aix 4.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
1 EDB exploit
10
CVSSv2
CVE-1999-0097
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Hp Hp-ux 9.08
Sun Sunos 5.3
Hp Hp-ux 9.06
Hp Hp-ux 9.04
Ibm Aix 4.2.1
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Sun Solaris 2.4
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Hp Hp-ux 9.03
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Hp Hp-ux 10.24
Hp Hp-ux 11.00
Ibm Aix 4.1.1
Hp Hp-ux 9.05
Hp Hp-ux 9.09
Sun Sunos 5.4
9.3
CVSSv2
CVE-2021-36000
Adobe Character Animator version 4.2 (and previous versions) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current use...
Adobe Character Animator
9.3
CVSSv2
CVE-2017-0588
A remote code execution vulnerability in id3/ID3.cpp in libstagefright in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code ex...
Google Android 4.0.1
Google Android 4.0.2
Google Android 4.0.3
Google Android 4.0.4
Google Android 6.0
Google Android 6.0.1
Google Android 5.0
Google Android 5.0.1
Google Android 4.2.2
Google Android 4.3
Google Android 4.3.1
Google Android 4.4
Google Android 7.0
Google Android 7.1.1
Google Android 5.0.2
Google Android 5.1.0
Google Android 4.0
Google Android 4.1
Google Android 4.2
Google Android 4.4.2
Google Android 4.4.4
Google Android 7.1.2
9.3
CVSSv2
CVE-2017-0592
A remote code execution vulnerability in FLACExtractor.cpp in libstagefright in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote c...
Google Android 7.1.2
Google Android 7.0
Google Android 7.1.0
Google Android 4.0.4
Google Android 4.1
Google Android 4.1.2
Google Android 4.2
Google Android 5.0.2
Google Android 5.1
Google Android 5.1.0
Google Android 5.1.1
Google Android 4.4
Google Android 4.4.1
Google Android 4.4.2
Google Android 4.4.3
Google Android 4.4.4
Google Android 7.1.1
Google Android 6.0.1
Google Android 5.0.1
Google Android 4.0
Google Android 4.0.2
Google Android 4.2.2
9.3
CVSSv2
CVE-2017-0541
A remote code execution vulnerability in sonivox in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the con...
Google Android 7.1.1
Google Android 7.0
Google Android 5.1
Google Android 5.1.0
Google Android 4.1
Google Android 4.1.2
Google Android 4.4.2
Google Android 4.4.3
Google Android 7.1.0
Google Android 6.0
Google Android 5.1.1
Google Android 4.0
Google Android 4.2
Google Android 4.2.1
Google Android 4.4.4
Google Android 5.0.1
Google Android 5.0.2
Google Android 4.0.3
Google Android 4.0.4
Google Android 4.4
Google Android 4.4.1
Google Android 6.0.1
1 Github repository
9.3
CVSSv2
CVE-2016-3861
LibUtils in Android 4.x prior to 4.4.4, 5.0.x prior to 5.0.2, 5.1.x prior to 5.1.1, 6.x prior to 2016-09-01, and 7.0 prior to 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote malicious users to execute arbit...
Google Android 7.0
Google Android 4.1.2
Google Android 4.2
Google Android 4.4.2
Google Android 4.4.3
Google Android 5.0
Google Android 4.0.2
Google Android 4.0.3
Google Android 4.3
Google Android 4.3.1
Google Android 6.0
Google Android 6.0.1
Google Android 4.0.4
Google Android 4.1
Google Android 4.4
Google Android 4.4.1
Google Android 5.1.0
Google Android 4.0
Google Android 4.0.1
Google Android 4.2.1
Google Android 4.2.2
Google Android 5.0.1
1 EDB exploit
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »