Sponsored Content
Special Forums Cybersecurity authentication bypass vulnerability Post 302479670 by programAngel on Sunday 12th of December 2010 09:09:37 AM
Old 12-12-2010
authentication bypass vulnerability

what does it mean?

I searched in google but I could not find a clear document that explain to me what does it mean.
 

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

How can I bypass the Prompt in SFTP

I am on a sun solaris server and trying to create a script that will test if SFTP is up and running on a remote server (which could be unix or windows). My thought was to simply invoke sftp and if I get the prompt ofr "Password" then that is an indication that the service is running and I am... (2 Replies)
Discussion started by: pierluigi22
2 Replies

2. Solaris

bypass password authentication for sftp in unix

I am using solaris unix 8.2 version. I want to bypass password authentication for sftp. Can you please give some ideas on this. thanks.Regards. (4 Replies)
Discussion started by: vijill
4 Replies

3. Solaris

can't bypass password authentication

I can able to SFTP from my web server unix to apps server unix end. but the other way from APPS server to Web server is still asking me the password. I have done same procedure both side. still i am having same problem. Any one help on this. thanks, regards (3 Replies)
Discussion started by: vijill
3 Replies

4. Shell Programming and Scripting

Script to bypass the password field

Hello all Im trying to write a script that can get past the "enter password" field.Coming to the details, Im planning to write a script that can actually check for the validity of certificates in websphere. There is a utility "keytool" that helps provide this information.However if we want to... (4 Replies)
Discussion started by: coolkid
4 Replies

5. Shell Programming and Scripting

awk Division By Zero Bypass

Hi Friends, I don't understand why "a" is always being printed as zero, when I execute the following command. awk '{if($6||$8||$10||$12==0)a=b=c=d=0;else (a=$5/$6);(b=$7/$8);(c=$9/$10);(d=$11/$12); {print... (6 Replies)
Discussion started by: jacobs.smith
6 Replies

6. HP-UX

Bypass stale PE ?

Hello, I have an ancient HP-UX 11.11 system where I have a logical volume marked stale and I can't get it sync'd. I have tried lvsync and lvreduce/lvextend to no avail. It is just one 4Mb PE on the disk that I can't get current. # lvdisplay -v /dev/vg00/lvol5 | grep stale LV Status ... (17 Replies)
Discussion started by: port43
17 Replies

7. UNIX for Beginners Questions & Answers

Bypass crontab??

Hi there. I've put something in crontab that my raspberry doesn't like, it's trying to draw a window before the graphics are ready after login. Problem being after the error it throws me back to the login, so I can't log in. There is only one user setup on this raspberry so I can't log in... (6 Replies)
Discussion started by: MuntyScrunt
6 Replies
TIGEXP(8)						      Administrator Commands							 TIGEXP(8)

NAME
tigexp - UNIX Security Checker Explanation Generator SYNOPSIS
tigexp msgid [msgid[msgid...]] tigexp [-f|-F] [security_report] DESCRIPTION
Tigexp is used to generate explanations of the output from the Tiger security checking package. In the first form, tigexp will generate an explanation of each of the message ids listed. In the second form, the security report specified will be scanned and explanations gener- ated. The -f option will generate one explanation for each unique message id in the security report, whereas the -F option will output the security report with explanations inserted after each entry in the report. There are five different message levels produced by Tiger. Each of the message levels is the last letter of the message id. The levels are: ALERT A message of this level indicates that Tiger has detected a possible intrusion attempt or troublesome misconfiguration which can expose the whole system to attacks. FAIL Messages of this level indicate a violation of a generic security policy or a possible intrusion. Appropriate action should be taken to fix this security issue. WARN Messages of this level indicate a security issue which should be checked further and might indicate a probable vulnerability or exposure. Most Tiger messages appear in this category. INFO These includes information messages which are not necessarily a security violation but might be useful for the administrator. Note that the tigerrc configuration file through the Tiger_Show_INFO_Msgs option determines whether or not Tiger shows these items. The default behaviour is to not show them. ERROR These messages are errors in the execution of Tiger (or any of its scripts), this is probably due to a misconfiguration in the pro- gram, because of a problem in the installation or because a file needed for the test is missing. The script who outputs this error should be investigated further. CONFIG Messages with this level inform of stages in the configuration process of Tiger. They are not errors (otherwise ERROR would be used) but notices for the user running the program explaining, for example, which configuration might be used. OPTIONS -f Scan the indicated security report and generate explanations of it. One explanation will be generated for each unique message id in the security report. If the name of a security report is not given, then the report is read from stdin. -F Output the indicated security report with explanations inserted after each entry in the report. If the name of a security report is not given, then the report is read from stdin. FILES
$TIGERHOMEDIR/doc/explain.idx SEE ALSO
tiger(8) BUGS
If the explanation index is out of date, it doesn't recognize it and generates junk. Security 12 August 2003 TIGEXP(8)
All times are GMT -4. The time now is 05:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy