Identify and fix file command vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | file, python security update | 16 May 201610:13 | – | centos |
![]() | file, python security update | 30 Nov 201519:28 | – | centos |
![]() | Scientific Linux Security Update : file on SL6.x i386/x86_64 (20160510) | 9 Jun 201600:00 | – | nessus |
![]() | CentOS 6 : file (CESA-2016:0760) | 17 May 201600:00 | – | nessus |
![]() | RHEL 6 : file (RHSA-2016:0760) | 12 May 201600:00 | – | nessus |
![]() | OracleVM 3.3 / 3.4 : file (OVMSA-2016-0050) | 16 May 201600:00 | – | nessus |
![]() | Oracle Linux 6 : file (ELSA-2016-0760) | 16 May 201600:00 | – | nessus |
![]() | Amazon Linux AMI : file (ALAS-2015-497) | 25 Mar 201500:00 | – | nessus |
![]() | openSUSE Security Update : file (openSUSE-2017-1298) | 27 Nov 201700:00 | – | nessus |
![]() | Fedora 21 : file-5.22-2.fc21 (2015-2020) | 18 Feb 201500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | i686 | file-libs | 5.04-30.el6 | file-libs-5.04-30.el6.i686.rpm |
RedHat | 6 | i686 | file-static | 5.04-30.el6 | file-static-5.04-30.el6.i686.rpm |
RedHat | 6 | s390x | file | 5.04-30.el6 | file-5.04-30.el6.s390x.rpm |
RedHat | 6 | x86_64 | file-libs | 5.04-30.el6 | file-libs-5.04-30.el6.x86_64.rpm |
RedHat | 6 | ppc64 | file-devel | 5.04-30.el6 | file-devel-5.04-30.el6.ppc64.rpm |
RedHat | 6 | x86_64 | file-devel | 5.04-30.el6 | file-devel-5.04-30.el6.x86_64.rpm |
RedHat | 6 | ppc64 | file-static | 5.04-30.el6 | file-static-5.04-30.el6.ppc64.rpm |
RedHat | 6 | s390x | python-magic | 5.04-30.el6 | python-magic-5.04-30.el6.s390x.rpm |
RedHat | 6 | x86_64 | python-magic | 5.04-30.el6 | python-magic-5.04-30.el6.x86_64.rpm |
RedHat | 6 | s390x | file-static | 5.04-30.el6 | file-static-5.04-30.el6.s390x.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo