Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
ce7f6a107c0e49df5ee8181fc2d13b8ed5da34db9446020cac7c1f8f82df3397
NGSSoftware Insight Security Research Advisory #NISR05012005I - IBM's DB2 database server contain four XML functions that can be used to read and write files on the system. Systems Affected: DB2 8.1.
b96a26b299af6b8dfd51f75246b6c5b612402295c834c9712ad99334ce4a205f
NGSSoftware Insight Security Research Advisory #NISR05012005H - IBM's DB2 database server contain four XML functions that suffer from stack based buffer overflow vulnerabilities. Systems Affected: DB2 8.1.
9a5db27238d552f7b43a081f1565127b3d1b829c519051fd7154784b75627dc8
NGSSoftware Insight Security Research Advisory #NISR05012005G - IBM DB2 is vulnerable to denial of service conditions when processing certain function calls. Systems Affected: DB2 8.1.
f3c908713847b92460a5a7d99df17b60b369dd3c656c7cfc290d0f990ee42c85
NGSSoftware Insight Security Research Advisory #NISR05012005F - Almost all shared memory sections and events in the Windows version of DB2 have weak permissions; all sections can be read and written by Everyone, and all events can be set and waited on by Everyone. This results in a number of security issues relating to the privileges of local users. Systems Affected: DB2 8.1.
710a1b87f503f48ddd770bd0d5c49acdd7ab71124cf9f67ce6157ca99e17f3fc
NGSSoftware Insight Security Research Advisory #NISR05012005E - IBM's DB2 database server, when configured for Satellite Administration includes a number of SQL functions. One of these, the SATENCRYPT function, suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1.
7d386e3e0437c1c85d6802b327e3efb8a9fa4ca901feee75516c9820b611581d
NGSSoftware Insight Security Research Advisory #NISR05012005D - IBM's DB2 JDBC Applet Server suffers from a stack based buffer overflow vulnerability that can be exploited remotely without a user ID or password. Systems Affected: DB2 8.1.
f1b0c032caaaca34c6de39e4209280e534786f0ddb5e39bce1e00bd9d05f0ca7
NGSSoftware Insight Security Research Advisory #NISR05012005C - IBM's DB2 database server suffers from a stack based buffer overflow vulnerability when using call. Systems Affected: DB2 8.1/7.x.
75e7cc2f74b9c5d19bd9e5a521176de0f8c998d0326b2e48c27a990f35438cf9
NGSSoftware Insight Security Research Advisory #NISR05012005B - libdb2.so.1, one of the libraries supplied with IBM's DB2 database server suffers from a buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.
a81f720fbef9bf57c906d4ba4a8c6424583a17436daff3676135f7916fd24c36
NGSSoftware Insight Security Research Advisory #NISR05012005A - IBM's DB2 database server suffers from a local attack whereby passing an overly parameter to the db2fmp binary will overflow a stack based buffer. Systems Affected: DB2 8.1/7.x.
b4c01bb875e8e863804f2afe3c1a596a966e1de1a34b6e4081a98bc4bc0a23a1
Whitepaper discussing SQL injection attacks that gives an illustrated overview showing the process of how these attacks are performed.
6919bd7b19365fb970cbb380dd2326a04eff29ffa171b4193991ff4c5c8b30d1
Secunia Security Advisory - Pierquinto Manco has reported a vulnerability in FlatNuke, which can be exploited by malicious people to compromise a vulnerable system.
ba8b84fe43e98e20552a5040815d2789ab738d2c046f294e7059f6a873f0b74b
Local root exploit for htget versions 0.9.x and below.
b00f0adbb375360a412bc0c36539c6f346a47598682b2be9741666ecb5fe30b7
Gentoo Linux Security Advisory GLSA 200501-03 - Various vulnerabilities were found and fixed in Mozilla-based products, ranging from a potential buffer overflow and temporary files disclosure to anti-spoofing issues.
3a382f2b5cdecc73c0e1b733116e72207c725296d0da07a4dd1c5d600fceada3
Debian Security Advisory 624-1 - A buffer overflow has been discovered in zip, the archiver for .zip files. When doing recursive folder compression the program did not check the resulting path length, which would lead to memory being overwritten. A malicious person could convince a user to create an archive containing a specially crafted path name, which could lead to the execution of arbitrary code.
80eb0fe00f369ec72d22068be95a49b49a010283eb4ed8df1df52030453ba699