Untrusted search path vulnerability in fwsnort before 1.6.4, allows local users to execute arbitrary code via Trojan horse fwsnort.con
Reporter | Title | Published | Views | Family All 17 |
---|---|---|---|---|
![]() | CVE-2014-0039 | 8 Feb 201400:55 | – | cve |
![]() | Medium: fwsnort | 17 Sep 201421:46 | – | amazon |
![]() | Amazon Linux: Security Advisory (ALAS-2014-409) | 8 Sep 201500:00 | – | openvas |
![]() | Fedora Update for fwsnort FEDORA-2014-1975 | 13 Feb 201400:00 | – | openvas |
![]() | Fedora Update for fwsnort FEDORA-2014-1975 | 13 Feb 201400:00 | – | openvas |
![]() | Fedora Update for fwsnort FEDORA-2014-1972 | 13 Feb 201400:00 | – | openvas |
![]() | Fedora Update for fwsnort FEDORA-2014-1972 | 13 Feb 201400:00 | – | openvas |
![]() | [SECURITY] Fedora 20 Update: fwsnort-1.6.4-1.fc20 | 12 Feb 201414:38 | – | fedora |
![]() | [SECURITY] Fedora 19 Update: fwsnort-1.6.4-1.fc19 | 12 Feb 201414:41 | – | fedora |
![]() | fwsnort 'fwsnort.conf'本地权限提升漏洞 | 20 Feb 201400:00 | – | seebug |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo