Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
the sleuth kit the sleuth kit vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-4195
Use-after-free vulnerability in ext2fs.c in Brian Carrier The Sleuth Kit (TSK) prior to 2.09 allows user-assisted remote malicious users to cause a denial of service (application crash) and prevent examination of certain ext2fs files via a malformed ext2fs image.
The Sleuth Kit The Sleuth Kit
NA
CVE-2007-2799
Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted malicious users to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement....
Sleuth Kit The Sleuth Kith
File File 4.2
8.1
CVSSv3
CVE-2018-11738
An issue exists in libtskfs.a in The Sleuth Kit (TSK) from release 4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found in the function ntfs_make_data_run in tsk/fs/ntfs.c which could be leveraged by an malicious user to disclose information or manipulated t...
Sleuthkit The Sleuth Kit
8.1
CVSSv3
CVE-2018-11739
An issue exists in libtskimg.a in The Sleuth Kit (TSK) from release 4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found in the function raw_read in tsk/img/raw.c which could be leveraged by an malicious user to disclose information or manipulated to read fr...
Sleuthkit The Sleuth Kit
8.1
CVSSv3
CVE-2018-11737
An issue exists in libtskfs.a in The Sleuth Kit (TSK) from release 4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found in the function ntfs_fix_idxrec in tsk/fs/ntfs_dent.cpp which could be leveraged by an malicious user to disclose information or manipulat...
Sleuthkit The Sleuth Kit
9.1
CVSSv3
CVE-2020-10233
In version 4.8.0 and previous versions of The Sleuth Kit (TSK), there is a heap-based buffer over-read in ntfs_dinode_lookup in fs/ntfs.c.
Sleuthkit The Sleuth Kit
8.1
CVSSv3
CVE-2018-11740
An issue exists in libtskbase.a in The Sleuth Kit (TSK) from release 4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found in the function tsk_UTF16toUTF8 in tsk/base/tsk_unicode.c which could be leveraged by an malicious user to disclose information or manip...
Sleuthkit The Sleuth Kit
7.8
CVSSv3
CVE-2022-45639
OS Command injection vulnerability in sleuthkit fls tool 4.11.1 allows malicious users to execute arbitrary commands via a crafted value to the m parameter. NOTE: third parties have disputed this because there is no analysis showing that the backtick command executes outside the ...
Sleuthkit The Sleuth Kit 4.11.1
NA
CVE-2012-5619
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonst...
Sleuthkit The Sleuth Kit 4.0.1
9.8
CVSSv3
CVE-2019-14531
An issue exists in The Sleuth Kit (TSK) 4.6.6. There is an out of bounds read on iso9660 while parsing System Use Sharing Protocol data in fs/iso9660.c.
Sleuthkit The Sleuth Kit 4.6.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »