[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:106401
fwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. In addition, fwsnort uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the s ...

oval:org.secpod.oval:def:106389
fwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. In addition, fwsnort uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the s ...

oval:org.secpod.oval:def:1600022
Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.

CPE    25
cpe:/a:cipherdyne:fwsnort:0.6.5
cpe:/a:cipherdyne:fwsnort:0.6.4
cpe:/a:cipherdyne:fwsnort:0.8.2
cpe:/a:cipherdyne:fwsnort:0.6.1
...
*CVE
CVE-2014-0039

© SecPod Technologies