[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:106401
fwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. In addition, fwsnort uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the s ...

oval:org.secpod.oval:def:106389
fwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. In addition, fwsnort uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the s ...

oval:org.secpod.oval:def:1600022
Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.

CVE    1
CVE-2014-0039
*CPE
cpe:/a:cipherdyne:fwsnort:0.6.5

© SecPod Technologies