Known Vulnerabilities for products from File
Listed below are 5 of the newest known vulnerabilities associated with the vendor "File".
These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.
Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-35385 | Not Provided | 2026-04-02 | 2026-04-02 | |
| CVE-2026-35094 | Not Provided | 2026-04-01 | 2026-04-01 | |
| CVE-2026-35093 | Not Provided | 2026-04-01 | 2026-04-01 | |
| CVE-2026-35000 | Not Provided | 2026-04-01 | 2026-04-01 | |
| CVE-2026-34838 | Not Provided | 2026-04-02 | 2026-04-02 | |
| CVE-2026-34830 | Not Provided | 2026-04-02 | 2026-04-02 | |
| CVE-2026-34829 | Not Provided | 2026-04-02 | 2026-04-02 | |
| CVE-2026-34826 | Not Provided | 2026-04-02 | 2026-04-02 | |
| CVE-2026-34797 | Not Provided | 2026-04-02 | 2026-04-02 | |
| CVE-2026-34796 | Not Provided | 2026-04-02 | 2026-04-02 | |
| CVE-2017-6512 | Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set t... | 5.9 - MEDIUM | 2017-06-01 | 2020-04-29 |
| CVE-2007-2799 | Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, mi... | 5.1 - MEDIUM | 2007-05-23 | 2018-10-16 |
| CVE-2007-1536 | Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arb... | 9.3 - HIGH | 2007-03-20 | 2018-10-16 |
| CVE-2004-1304 | Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via... | 10 - HIGH | 2005-01-10 | 2017-07-11 |
| CVE-2003-0102 | Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running f... | 4.6 - MEDIUM | 2003-03-18 | 2018-05-03 |