CiscoWorks Common Services contains a vulnerability that could allow a remote attacker to execute arbitrary code. The risk is HIGH. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the user client machine.
Hi there,
I am trying to find info about the commonly used ports and how it can be vulnerable and to identify them?
For example, I would like to identify how to man-in-the-middle using these ports 21(FTP),22(SSH),23(TELNET), (1 Reply)
SECMOD.DB(5) Network Security Services SECMOD.DB(5)NAME
secmod.db - Legacy NSS security modules database
DESCRIPTION
secmod.db is an NSS security modules database.
The security modules database is used to keep track of the NSS security modules. The NSS security modules export their services via the
PKCS #11 API which NSS uses as its Services Provider Interface.
The command line utility modutil is used for managing PKCS #11 module information both within secmod.db files and within hardware tokens.
For new applications the recommended way of tracking security modules is via the pkcs11.txt configuration file used in conjunction the new
sqlite-based shared database format for certificate and key databases.
FILES
/etc/pki/nssdb/secmod.db
SEE ALSO modutil(1), cert8.db(5), cert9.db(5), key3.db(5), key4.db(5), pkcs11.txt(5)AUTHORS
The nss libraries were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google.
Authors: Elio Maldonado <emaldona@redhat.com>.
LICENSE
Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at
http://mozilla.org/MPL/2.0/.
nss 3.15.4 17 June 2014 SECMOD.DB(5)