Vulnerabilities > File
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-06-01 | CVE-2017-6512 | Race Condition vulnerability in multiple products Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic. | 4.3 |
2007-05-23 | CVE-2007-2799 | Numeric Errors vulnerability in multiple products Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement. | 5.1 |
2007-03-20 | CVE-2007-1536 | Numeric Errors vulnerability in File Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. | 9.3 |
2005-01-10 | CVE-2004-1304 | Buffer Overflow vulnerability in File ELF Header Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file. | 10.0 |
2003-03-18 | CVE-2003-0102 | Local Stack Overflow Code Execution vulnerability in File Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize). | 4.6 |