|
|
| |
| Sleuth Kit is prone to a security-bypass weakness. |
| |
Credit:
The information has been provided by Wim Bertels.
|
| |
Vulnerable Systems:
* Sleuth Kit 4.0.1
Successful exploits may allow attackers to bypass detection rules; this may aid in further attacks.
CVE Information:
CVE-2012-5619
Disclosure Timeline:
Published: December 04 2012
|
|
blog comments powered by
|