Download
| Alert*
oval:org.secpod.oval:def:106401
fwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. In addition, fwsnort uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the s ... oval:org.secpod.oval:def:106389 fwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. In addition, fwsnort uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the s ... oval:org.secpod.oval:def:1600022 Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory. |