ME Firewall Analyzer version 7.2 suffers from a cross site scripting vulnerability.
807a36ac94fbdfe7f86cd18c5af686679dbbcf0c989ee602fbb46548adfb50dc
This exploits an insecure config found in Scrutinizer NetFlow & sFlow Analyzer. By default, the software installs a default password in MySQL, and binds the service to "0.0.0.0". This allows any remote user to login to MySQL, and then gain arbitrary remote code execution under the context of 'SYSTEM'. Examples of default credentials include: 'scrutinizer:admin', and 'scrutremote:admin'.
61e06a2fa99c7125dcd2af5faeafdcb8556b0880070d66206fa0180b420ee612
Secunia Security Advisory - A weakness has been discovered in Scrutinizer NetFlow and sFlow Analyzer, which can be exploited by malicious, local users to bypass certain security restrictions.
eb4bc7c7983fbc936d2f8fc9acc61b3ad6789d493a3111747661dfc717954d3c
Scrutinizer NetFlow and sFlow Analyzer versions 9.0.1 and below suffer from bypass, cross site scripting, and remote file upload vulnerabilities. It also has undocumented MySQL admin users.
5bbd69706e38d6f70c41925cdab4681651c0862b6cc58df5c29389f62daf07d3
Secunia Security Advisory - Hitachi has acknowledged a vulnerability in Hitachi IT Operations Analyzer, which can be exploited by malicious people to cause a DoS (Denial of Service).
f41915f00a8270e10966603ead09bedd7362a4dd87ac0e6894e93da0fb3a36c9
Secunia Security Advisory - A vulnerability has been reported in Adiscon LogAnalyzer, which can be exploited by malicious people to conduct cross-site scripting attacks.
5716f0096bf422650b6e4a56a898977ef95ff28ae05be2944c1a552cbfe7e842
Red Hat Security Advisory 2012-0841-04 - ABRT is a tool to help users to detect defects in applications and to create a bug report with all the information needed by a maintainer to fix it. It uses a plug-in system to extend its functionality. libreport provides an API for reporting different problems in applications to different bug targets, such as Bugzilla, FTP, and Trac. The btparser utility is a backtrace parser and analyzer library, which works with backtraces produced by the GNU Project Debugger. It can parse a text file with a backtrace to a tree of C structures, allowing to analyze the threads and frames of the backtrace and process them.
bd72154a1c7c9f34d01a0388a2d739ac8d018b2bd3b877ce4278e6dd64c6a0a6
LogAnalyzer version 3.4.2 suffers from cross site scripting, arbitrary file reading, and remote SQL injection vulnerabilities.
20e0cd6da8ae12e950d981ee3947ff25853bdc8fedef7053293f570dfee099d1
Secunia Security Advisory - Codseq has discovered multiple vulnerabilities in Adiscon LogAnalyzer, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.
b53f4c7909bd71be210b970d4fd281b79f3a83074200830f5fdf510e1b6caa91
Secunia Security Advisory - Tanya Secker has discovered multiple vulnerabilities in Scrutinizer NetFlow and sFlow Analyzer, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks and bypass certain security restrictions.
d2d4ed57a43dd9a9f773f04f9cecd8ae974304d7813230da246b204b04424cf3
Scrutinizer NetFlow and sFlow Analyzer version 8.6.2 suffers from authentication bypass, cross site scripting, and remote SQL injection vulnerabilities.
86781806a8d76416882371c450d483f0f4d9a6334ea56d9463f55a227d424643
Secunia Security Advisory - Tanya Secker has discovered a vulnerability in Scrutinizer NetFlow and sFlow Analyzer, which can be exploited by malicious people to bypass certain security restrictions.
b2ff4d749daacd17a86c4b8616be739c564b76c8235bf5d349e1a31bd76f1ba2
Secunia Security Advisory - Vulnerability Lab has discovered multiple vulnerabilities in ManageEngine Firewall Analyzer, which can be exploited by malicious people to conduct cross-site scripting attacks.
85c7aceedbc32bcf9f5be43abc3bf5c24408c9c3bff579d6e029278f00c9a10d
Secunia Security Advisory - A vulnerability has been reported in Hitachi IT Operations Analyzer, which can be exploited by malicious people to conduct cross-site scripting attacks.
055f9f461ce2e8132158b40bf968074da5b54b27e62b0b0c7038f723404570d3
Debian Linux Security Advisory 2395-1 - Laurent Butti discovered a buffer underflow in the LANalyzer dissector of the Wireshark network traffic analyzer, which could lead to the execution of arbitrary code.
db5d52a2cbb18e449cd474aa792a53fcfd3c5a2b03ecd9e99dfbe43ca1a56237
Secunia Security Advisory - A vulnerability has been reported in Hitachi IT Operations Analyzer, which can be exploited by malicious people to conduct cross-site scripting attacks.
ce4610f11086d9231fe07460b6ce095571fb543acb42fe387521d64fe281c034
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the source code release.
6352a7f68b6f325e14965c399357591a7967cf3f94b01e84c3b50cc40feebb1d
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Windows binary release.
f5253935e65bded169b9eb1520383ec1ef681017576cffd49e913ce86360e776
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Mac OS X release.
b7e6bb1ee16faf6bfd26776d9d1ff947783c70e5a3d0cad08b8fa740360e6131
fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.
da806dbaaa56fdfd36a208b15bfeccaa0531f0789ad1355e43c047523ea60a48
Secunia Security Advisory - Two vulnerabilities have been reported in FortiNet FortiAnalyzer, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.
da251bb3e5bfaecf28ff85e02b39e99778fe6a9a3c68f62b95bbc8721d03f4c4
SAP DIAG Plugin extends the basic functionality of the WireShark network packet analyzer and provides additional features of SAP DIAG protocol analysis. This extension allows one to collect and decompress SAP DIAG packets in the course of interaction between SAP Front-end client software and SAP application servers. To install you must copy plugin pt_sap_diag_wireshark_plugin.dll in folder %WiresharkInstallDir%/plugins/%version%.
71b7091784b0e766fa93438f71e44dfd4531729520e52c51315fc46a5cd26b60
FortiAnalyzer Appliance suffers from cross site scripting vulnerabilities.
c0e3048326f3314f8001e5a5642d92e40a25d98ed6db5d39e9a82a38198bc72f
ME Firewall Analyzer version 7.1 suffers from persistent cross site scripting vulnerabilities.
22f34bf28a703e508eadfc9804206d917783cf642f3c48338853e9308864817e
Secunia Security Advisory - Hitachi has acknowledged a vulnerability in Hitachi IT Operations Analyzer and Director, which can be exploited by malicious people to cause a DoS (Denial of Service).
5ce1921b0475fc79824c2bd52b5ea4fa9d458c6f72a1fe8a8fe08ee55e89c6cb
Glyptodon is a little file-system analyzer for Linux systems. It is written in bash and it comes with an installer to make it run everyday automatically. This script writes some general information about file permissions, socket, ownership, etc. It also verifies the file-system for potential risks, such as set-uid files, world writable files, symlinks nouser files, etc.
0c9a68bfb2e52bdc81f2316f067d7f264897eb737ada4467537a3e3f11c576b8