Total CVEs

126,178

Critical Severity

2,292

High Severity

7,949

Last 7 Days

1,215
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 1,781 - 1,800 of 22,583 CVEs

A logic error in the cut utility of uutils coreutils causes the utility to ignore the -s (only-delimited) flag when using the -z (null-terminated) and -d '' (empty delimiter) options together. The implementation incorrectly routes this specific combination through a specialized newline-del...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35380 MEDIUM - 5.5

A logic error in the cut utility of uutils coreutils causes the program to incorrectly interpret the literal two-byte string '' (two single quotes) as an empty delimiter. The implementation mistakenly maps this string to the NUL character for both the -d (delimiter) and --output-delimiter ...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD

A logic error in the tr utility of uutils coreutils causes the program to incorrectly define the [:graph:] and [:print:] character classes. The implementation mistakenly includes the ASCII space character (0x20) in the [:graph:] class and excludes it from the [:print:] class, effectively reversing t...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD

A logic error in the expr utility of uutils coreutils causes the program to evaluate parenthesized subexpressions during the parsing phase rather than at the execution phase. This implementation flaw prevents the utility from performing proper short-circuiting for logical OR (|) and AND (&) oper...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD

A logic error in the env utility of uutils coreutils causes a failure to correctly parse command-line arguments when utilizing the -S (split-string) option. In GNU env, backslashes within single quotes are treated literally (with the exceptions of \\ and \'). However, the uutils implementation ...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35376 MEDIUM - 4.5

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the chcon utility of uutils coreutils during recursive operations. The implementation resolves recursive targets using a fresh path lookup (via fts_accpath) rather than binding the traversal and label application to the specific directo...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD

A logic error in the split utility of uutils coreutils causes the corruption of output filenames when provided with non-UTF-8 prefix or suffix inputs. The implementation utilizes to_string_lossy() when constructing chunk filenames, which automatically rewrites invalid byte sequences into the UTF-8 r...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35374 MEDIUM - 6.3

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the split utility of uutils coreutils. The program attempts to prevent data loss by checking for identity between input and output files using their file paths before initiating the split operation. However, the utility subsequently ope...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD

A logic error in the ln utility of uutils coreutils causes the program to reject source paths containing non-UTF-8 filename bytes when using target-directory forms (e.g., ln SOURCE... DIRECTORY). While GNU ln treats filenames as raw bytes and creates the links correctly, the uutils implementation en...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35372 MEDIUM - 5.0

A logic error in the ln utility of uutils coreutils allows the utility to dereference a symbolic link target even when the --no-dereference (or -n) flag is explicitly provided. The implementation previously only honored the "no-dereference" intent if the --force (overwrite) mode was also e...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD

The id utility in uutils coreutils exhibits incorrect behavior in its "pretty print" output when the real UID and effective UID differ. The implementation incorrectly uses the effective GID instead of the effective UID when performing a name lookup for the effective user. This results in m...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35370 MEDIUM - 4.4

The id utility in uutils coreutils miscalculates the groups= section of its output. The implementation uses a user's real GID instead of their effective GID to compute the group list, leading to potentially divergent output compared to GNU coreutils. Because many scripts and automated processes...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35369 MEDIUM - 5.5

An argument parsing error in the kill utility of uutils coreutils incorrectly interprets kill -1 as a request to send the default signal (SIGTERM) to PID -1. Sending a signal to PID -1 causes the kernel to terminate all processes visible to the caller, potentially leading to a system crash or massiv...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35368 HIGH - 7.8

A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, this can trigger the Name Service Switch (NSS) to load ...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD

The nohup utility in uutils coreutils creates its default output file, nohup.out, without specifying explicit restricted permissions. This causes the file to inherit umask-based permissions, typically resulting in a world-readable file (0644). In multi-user environments, this allows any user on the ...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35366 MEDIUM - 4.4

The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows ma...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35365 MEDIUM - 6.6

The mv utility in uutils coreutils improperly handles directory trees containing symbolic links during moves across filesystem boundaries. Instead of preserving symlinks, the implementation expands them, copying the linked targets as real files or directories at the destination. This can lead to res...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35364 MEDIUM - 6.3

A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mv utility of uutils coreutils during cross-device operations. The utility removes the destination path before recreating it through a copy operation. A local attacker with write access to the destination directory can exploit this...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD
CVE-2026-35363 MEDIUM - 5.6

A vulnerability in the rm utility of uutils coreutils allows the bypass of safeguard mechanisms intended to protect the current directory. While the utility correctly refuses to delete . or .., it fails to recognize equivalent paths with trailing slashes, such as ./ or .///. An accidental or malicio...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD

The safe_traversal module in uutils coreutils, which provides protection against Time-of-Check to Time-of-Use (TOCTOU) symlink races using file-descriptor-relative syscalls, is incorrectly limited to Linux targets. On other Unix-like systems such as macOS and FreeBSD, the utility fails to utilize th...

Vendor: Uutils
Product: coreutils
Published: Apr 22, 2026
Source: NVD