Tripwire commercial versions equal to and below 2.4 and Tripwire open source versions equal to and below 2.3.1 are susceptible to a format string vulnerability an email report is generated. This vulnerability allows an attacker to execute arbitrary code with the rights of the user running the file check, which is typically root.
92e5eef21ab6cff8a801d98be62205f1d78683b06bdc07dc1cffa5141ea0a2a7
tcpstat reports certain network interface statistics much like vmstat does for system statistics. It gets its information by either monitoring a specific interface, or by reading previously-saved tcpdump data from a file.
1ddcfe381f7a13ea79d5995aee91be5fff52c13701326fa4150536f51119da74
tcpstat reports certain network interface statistics much like vmstat does for system statistics. It gets its information by either monitoring a specific interface, or by reading previously-saved tcpdump data from a file.
8edb73f6803ede586e25af50372fb27761403ac583b60f92bf382f1121079fb1
tcpstat reports certain network interface statistics much like vmstat does for system statistics. It gets its information by either monitoring a specific interface, or by reading previously-saved tcpdump data from a file.
1ea53182cab13b540301f88d750a465f53b542f915f02bede7e12a9d968458a0