Direct Vulnerabilities

Known vulnerabilities in the coreutils package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Preservation of Permissions

[0.0.0,)
  • M
Improper Preservation of Permissions

[0.0.0,)
  • M
Insecure Temporary File

[,0.6.0)
  • M
Improper Handling of Unicode Encoding

[,0.6.0)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Unchecked Return Value

[0.0.0,)
  • M
Improper Input Validation

[,0.6.0)
  • H
Incorrect Permission Assignment for Critical Resource

[0.0.0,)
  • M
Incorrect Check of Function Return Value

[,0.6.0)
  • H
Directory Traversal

[,0.6.0)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[,0.6.0)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[,0.6.0)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Use of Incorrectly-Resolved Name or Reference

[,0.7.0)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[,0.7.0)
  • M
Always-Incorrect Control Flow Implementation

[,0.7.0)
  • M
Symlink Attack

[,0.7.0)
  • M
Uncaught Exception

[0.0.0,)
  • M
Incorrect Check of Function Return Value

[,0.6.0)
  • H
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Improper Preservation of Permissions

[,0.6.0)
  • M
Incorrect Authorization

[0.0.0,)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Improper Check for Unusual or Exceptional Conditions

[,0.6.0)
  • L
Time-of-check Time-of-use (TOCTOU) Race Condition

[,0.6.0)
  • M
Directory Traversal

[0.0.0,)
  • M
Improper Input Validation

[,0.6.0)
  • H
Untrusted Search Path

[0.0.0,)
  • M
Incorrect Permission Assignment for Critical Resource

[0.0.0,)
  • M
Symlink Attack

[,0.7.0)
  • M
User Interface (UI) Misrepresentation of Critical Information

[0.0.0,)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Improper Input Validation

[,0.8.0)
  • M
Incorrect Short Circuit Evaluation

[,0.8.0)
  • M
UNIX Symbolic Link (Symlink) Following

[,0.8.0)
  • L
Time-of-check Time-of-use (TOCTOU) Race Condition

[0.0.0,)
  • M
Improper Handling of Unicode Encoding

[0.0.0,)
  • M
Incorrect Provision of Specified Functionality

[,0.8.0)
  • M
Improper Handling of Unicode Encoding

[,0.8.0)
  • M
Improper Check for Unusual or Exceptional Conditions

[0.0.0,)
  • M
Incorrect Provision of Specified Functionality

[,0.8.0)