AlgoSec Firewall Analyzer version 6.4 suffers from a cross site scripting vulnerability.
9bcc2f40ac9e807f1a16248fc4024bf27aad4a0478dac50095192c75003afc86
The NetFlow Analyzer version 5 and the OpManager version 7 suffer from cross site scripting vulnerabilities.
903687236cd10c8ffd7a15e78746a174fb05988d7562c1a2d88dab24ab95b07e
Secunia Security Advisory - Lostmon has discovered some vulnerabilities in ManageEngine NetFlow Analyzer, which can be exploited by malicious people to conduct cross-site scripting attacks.
97881fd2cd9833f7620fc59e2b6af8d25c07e52b810705b02c8f2969a364f7a5
Debian Security Advisory 1322-1 - Several remote vulnerabilities have been discovered in the Wireshark network traffic analyzer, which may lead to denial of service.
ac8689f188bfac13ad323bb2cdbc50dcc7416383ec5bc0b4245e975c839e1d32
Secunia Security Advisory - Leon Juranic has discovered some vulnerabilities in eIQNetworks Enterprise Security Analyzer, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
53e37b9aab6225259441acaf00e4c4e7965f36ffe4e10186970d7f5c9c860a57
During an audit of Enterprise Security Analyzer, multiple remote buffer overflows have been discovered in the ESA server (TCP port 10616). There are various stack and heap overflows in multiple ESA requests. The vulnerability has been identified in the latest available Enterprise Security Analyzer v2.5. Previous versions are believed to be vulnerable as well.
7cfad04c205329f1f36fe4c6cad33a97921cb4da56226e103ba111b14bd847cd
Secunia Security Advisory - yearsilent has reported a security issue in ManageEngine Firewall Analyzer, which can be exploited by malicious users to disclose potentially sensitive information.
7230315f023e74d821fe0c08f0773378c0c3634a03cc77de3458ba7c04c1094a
WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.
6229b09058a3e7d1693e46981effd74d69bcf1f95c06ff5d8f498697f2e01161
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Screenshot available here.
1144dfb1e40ebeb2bb206ddcb365b8f3565175c742edfe031ce7baeb9b9bce28
Remote exploitation of a null pointer dereference exception allows for remote attackers to crash the EIQ Network Security Analyzer DataCollector service. Proof of concept code included.
c0b59ba8423b52c53bb5d71af4b0a0a7949088f8c0b4de25895ca990ce8a071d
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Screenshot available here.
6bd0a5cc36765c3f046e82be3599066cdfdb77e6f692a646dafbc9ae602385cf
WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.
73412210dcb767be34f178fa9e4b4bebe920815b1809c4fd42a20e7e5527b6dc
The eIQnetworks Enterprise Security Analyzer suffers from multiple vulnerabilities that allow remote attackers the ability to execute arbitrary code.
0c958ba0e58c280878e97816e04c3b684803e7205a47ff82e11b381192278831
phpPrintAnalyzer version 1.1 suffers from a remote file inclusion vulnerability.
d43cbe2771c421b971cd38e22a372d9d57492d47f451434feb09190d0fe092d1
Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.
2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984
This Metasploit module exploits the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer. This module exploits buffers of 1262 bytes in size. This module should work on all rebranded eiq analyzers. Exploitation assistance from KF of digital munition.
e4ce3e36553a518104ebf7e58cf8a9dd52695a1715d37a0ba3161d6ab879f3ed
This Metasploit module exploits the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer. This module exploits buffers of 494 bytes in size. This module should work on all EIQ branded analyzers. Exploitation assistance from KF.
88bc70754e26114c4ff252085966059a0af29b9d43f03db6984fbde54d0ad30a
Secunia Security Advisory - A vulnerability has been reported in Top Layer Network Security Analyzer, which can be exploited by malicious people to compromise a vulnerable system.
32c41a5f32f9b3d8aac320ae26da6a1a23869a6dcf473837d30e24440549cb08
A vulnerability exists in the IQnetworks Enterprise Security Analyzer. The specific flaw exists within Topology.exe, which binds by default to TCP port 10628. During the processing of long prefixes to the GUIADDDEVICE, ADDDEVICE, or DELETEDEVICE command, a stack based buffer overflow occurs.
07715bdb168d079a02768f60b7e9cb7b8b0b077fa559ea98206c1f98d030d8c1
A vulnerability exists in the IQnetworks Enterprise Security Analyzer. The flaw specifically exists within the Syslog daemon, syslogserver.exe, during the processing of long arguments passed through various commands on TCP port 10617.
d8b970170559300470f77cd29528899de52f7ba78748847d398c43a0525f8b81
A vulnerability exists in the IQnetworks Enterprise Security Analyzer. The specific flaw exists within EnterpriseSecurityAnalyzer.exe, which binds by default to TCP port 10616. During the processing of long arguments to the LICMGR_ADDLICENSE command a stack based buffer overflow occurs.
62dba3a26852eedc18c6ce2aca71f4563fcba6abc5407d832c1d9a918fee9f91
A vulnerability exists in the IQnetworks Enterprise Security Analyzer. The specific flaw exists within the Syslog daemon, syslogserver.exe, during the processing of long strings transmitted to the listening TCP port. The vulnerability is not exposed over UDP. The default configuration does not expose the open TCP port.
a93fa646bd210b8b85b4516fdbb4826f6595d3ffb4b5d0586c0626b6ceb35603
Mandriva Linux Security Advisory MDKSA-2006-128 - A number of vulnerabilities have been discovered in the Wireshark (formerly Ethereal) network analyzer. These issues have been corrected in Wireshark version 0.99.2.
a70e6c883ef037267ed1f7d564acf25d348100eca2cc612cd35405e159068879
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Screenshot available here.
ef2f857fd8d1001890b86834dc3275214f7717fa6948c27829f6575d9b8023bf
ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).
6bd1149148ead2a60e8e4240f0e21a2b37902de7897f914e1c6150d44ba17e3f
Nuhe is a rule based log monitoring system which is capable of taking action when rules are matched against log activity. By default, Nuhe runs in the background (as a daemon), but it can also be used in the foreground in a log analyzer mode.
edcc580b161a01f1914a0fc8937717390707daa6ea9844b2b3de2730cfc16cee