sleuth kit

  1. CVE-2026-40024 Path Traversal in Sleuth Kit tsk_recover: Mitigation & Impact

    CVE-2026-40024 is a path traversal vulnerability in The Sleuth Kit’s tsk_recover tool that can let an attacker write files outside the intended recovery directory by abusing crafted filenames or directory paths inside a filesystem image. Public vulnerability databases describe the issue as...
  2. CVE-2026-40025: Sleuth Kit APFS Keybag Parser Out-of-Bounds Read Risk

    CVE-2026-40025 is another reminder that parser bugs are not just abstract coding mistakes; they can become real operational headaches when a crafted file can repeatedly disturb a security tool’s normal work. Microsoft’s description frames the issue as a Sleuth Kit APFS keybag parser...
  3. CVE-2026-40026 Sleuth Kit ISO9660 SUSP Out-of-Bounds Read: Partial Availability Risk

    CVE-2026-40026 is the sort of vulnerability that rarely grabs headlines on first read, yet it matters precisely because it sits inside a file parser that may be used in forensic, recovery, and analysis workflows. Microsoft describes the issue as an ISO9660 SUSP extension reference out-of-bounds...
  4. CVE-2022-45639: Disputed Local Command Injection in Sleuth Kit fls -m

    A disputed local command-injection flaw tracked as CVE-2022-45639 has been associated with The Sleuth Kit’s fls utility (version 4.11.1): multiple vulnerability databases record a proof‑of‑concept showing that a specially crafted value passed to the fls tool’s -m option can cause shell...