Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file file 4.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1304
Stack-based buffer overflow in the ELF header parsing code in file prior to 4.12 allows malicious users to execute arbitrary code via a crafted ELF file.
File File 4.3
File File 4.4
File File 4.1
File File 4.10
File File 4.7
File File 4.8
File File 4.11
File File 4.2
File File 4.9
File File 4.0
File File 4.5
File File 4.6
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Gentoo Linux
Trustix Secure Linux 2.2
1 EDB exploit
NA
CVE-2007-2799
Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted malicious users to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement....
Sleuth Kit The Sleuth Kith
File File 4.2
NA
CVE-2004-2111
Stack-based buffer overflow in the site chmod command in Serv-U FTP Server prior to 4.2 allows remote malicious users to execute arbitrary code via a long filename.
Solarwinds Serv-u File Server 4.0.0.4
Solarwinds Serv-u File Server 3.0.0.17
Solarwinds Serv-u File Server 4.1.0.0
Solarwinds Serv-u File Server
Solarwinds Serv-u File Server 3.1.0.3
Solarwinds Serv-u File Server 3.0.0.16
Solarwinds Serv-u File Server 3.1.0.0
Solarwinds Serv-u File Server 3.1.0.1
5 EDB exploits
7
CVSSv3
CVE-2016-2985
IBM Spectrum Scale 4.1.1.x prior to 4.1.1.8 and 4.2.x prior to 4.2.0.4 and General Parallel File System (GPFS) 3.5.x prior to 3.5.0.32 and 4.1.x prior to 4.1.1.8 allow local users to gain privileges via crafted environment variables to a /usr/lpp/mmfs/bin/ setuid program.
Ibm Spectrum Scale 4.1.1.2
Ibm Spectrum Scale 4.1.1.3
Ibm Spectrum Scale 4.2.0.1
Ibm Spectrum Scale 4.2.0.2
Ibm Spectrum Scale 4.1.1.4
Ibm Spectrum Scale 4.1.1.5
Ibm Spectrum Scale 4.1.1.0
Ibm Spectrum Scale 4.1.1.1
Ibm Spectrum Scale 4.1.1.8
Ibm Spectrum Scale 4.2.0.0
Ibm Spectrum Scale 4.2.0.3
Ibm Spectrum Scale 4.1.1.6
Ibm Spectrum Scale 4.1.1.7
Ibm General Parallel File System 4.1.0.5
Ibm General Parallel File System 4.1.0.6
Ibm General Parallel File System 3.5.0.4
Ibm General Parallel File System 3.5.0.5
Ibm General Parallel File System 3.5.0.12
Ibm General Parallel File System 4.1.0.3
Ibm General Parallel File System 4.1.0.4
Ibm General Parallel File System 3.5.0.2
Ibm General Parallel File System 3.5.0.3
7
CVSSv3
CVE-2016-2984
IBM Spectrum Scale 4.1.1.x prior to 4.1.1.8 and 4.2.x prior to 4.2.0.4 and General Parallel File System (GPFS) 3.5.x prior to 3.5.0.32 and 4.1.x prior to 4.1.1.8 allow local users to gain privileges via crafted command-line parameters to a /usr/lpp/mmfs/bin/ setuid program.
Ibm Spectrum Scale 4.1.1.6
Ibm Spectrum Scale 4.1.1.7
Ibm Spectrum Scale 4.1.1.0
Ibm Spectrum Scale 4.1.1.1
Ibm Spectrum Scale 4.1.1.8
Ibm Spectrum Scale 4.2.0.0
Ibm Spectrum Scale 4.1.1.2
Ibm Spectrum Scale 4.1.1.3
Ibm Spectrum Scale 4.2.0.1
Ibm Spectrum Scale 4.2.0.2
Ibm Spectrum Scale 4.1.1.4
Ibm Spectrum Scale 4.1.1.5
Ibm Spectrum Scale 4.2.0.3
Ibm General Parallel File System 4.1.0.0
Ibm General Parallel File System 4.1.0.1
Ibm General Parallel File System 3.5.0.0
Ibm General Parallel File System 3.5.0.1
Ibm General Parallel File System 3.5.0.8
Ibm General Parallel File System 3.5.0.9
Ibm General Parallel File System 3.5.0.16
Ibm General Parallel File System 3.5.0.17
Ibm General Parallel File System 3.5.0.25
7
CVSSv3
CVE-2016-0263
IBM Spectrum Scale 4.1 prior to 4.1.1.5 and 4.2 prior to 4.2.0.2 and General Parallel File System 3.5 prior to 3.5.0.30 allow local users to gain privileges or cause a denial of service via a crafted mmapplypolicy command.
Ibm General Parallel File System Storage Server 3.5.0.29
Ibm General Parallel File System Storage Server 3.5.0.28
Ibm General Parallel File System Storage Server 3.5.0.21
Ibm General Parallel File System Storage Server 3.5.0.20
Ibm General Parallel File System Storage Server 3.5.0.12
Ibm General Parallel File System Storage Server 3.5.0.11
Ibm General Parallel File System Storage Server 3.5.0.4
Ibm General Parallel File System Storage Server 3.5.0.3
Ibm General Parallel File System Storage Server 3.5.0.23
Ibm General Parallel File System Storage Server 3.5.0.22
Ibm General Parallel File System Storage Server 3.5.0.15
Ibm General Parallel File System Storage Server 3.5.0.14
Ibm General Parallel File System Storage Server 3.5.0.13
Ibm General Parallel File System Storage Server 3.5.0.6
Ibm General Parallel File System Storage Server 3.5.0.5
Ibm General Parallel File System Storage Server 3.5.0.27
Ibm General Parallel File System Storage Server 3.5.0.26
Ibm General Parallel File System Storage Server 3.5.0.19
Ibm General Parallel File System Storage Server 3.5.0.18
Ibm General Parallel File System Storage Server 3.5.0.10
Ibm General Parallel File System Storage Server 3.5.0.9
Ibm General Parallel File System Storage Server 3.5.0.2
NA
CVE-2008-5894
Directory traversal vulnerability in index.php in Mediatheka 4.2 allows remote malicious users to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
Mediatheka Mediatheka 4.2
1 EDB exploit
NA
CVE-2006-2442
kphone 4.2 creates .qt/kphonerc with world-readable permissions, which allows local users to read usernames and SIP passwords.
Kphone Kphone 4.2
NA
CVE-2006-5289
Multiple PHP remote file inclusion vulnerabilities in Vtiger CRM 4.2 and previous versions allow remote malicious users to execute arbitrary PHP code via a URL in the calpath parameter to (1) modules/Calendar/admin/update.php, (2) modules/Calendar/admin/scheme.php, or (3) modules...
Vtiger Vtiger Crm 4.2
1 EDB exploit
NA
CVE-1999-1117
lquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter.
Ibm Aix 4.1
Ibm Aix 4.2
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »