Lucene search

K

Rootkit Hunter Security Vulnerabilities

cve
cve

CVE-2005-1270

The (1) check_update.sh and (2) rkhunter script in Rootkit Hunter before 1.2.3-r1 create temporary files with predictable file names, which allows local users to overwrite arbitrary files via a symlink attack.

6AI Score

0.0004EPSS

2005-04-28 04:00 AM
28
cve
cve

CVE-2017-7480

rkhunter versions before 1.4.4 are vulnerable to file download over insecure channel when doing mirror update resulting into potential remote code execution.

9.8CVSS

9.6AI Score

0.016EPSS

2017-07-21 10:29 PM
54