NSFOCUS Security Advisory - The NSFOCUS Security Team discovered a security vulnerability in Microsoft Internet Explorer. This flaw could be used to corrupt memory resulting in application crash and possible code execution by convincing users to open specially crafted HTML files.
304ad6848efcde6c6b6b142064862fe425d9b17265e995651fed164dbf1712c1
The NSFOCUS Security Team discovered a remote DoS vulnerability in Microsoft Windows kernel. A carefully crafted PE file might crash the operating system.
83bec49a4de3f4a653258a9bd7e85af622119532d20290f8a1c16db95ad42c23
The NSFOCUS Security Team discovered a remote DoS vulnerability in IBM DB2, which will cause IBM DB2 JDBC Applet Server to exit due to out-of-bound access by sending carefully crafted data to the Server.
f95c073409e963ee652e3791ebf0dc1dfa3d3aa8eb6e75386bec4224707968fd
The NSFOCUS Security Team discovered a stack buffer overflow vulnerability in UiPlayer which allows remote attackers to run arbitrary code on user system by crafting a malicious webpage. UiTV UiPlayer UiCheck.dll versions 1.0.0.6 and below are affected.
29aa28c3e6795a7de36c986d330e876e65efa9aac9df5bf85f94d0d4dd022529
The NSFOCUS Security Team has discovered a remote buffer overflow vulnerability in the Cisco Security Agent for Windows which allows remote code execution by sending a malicious SMB request. Cisco Security Agent for Windows versions below 4.5.1.672, 5.0.0.225, 5.1.0.106, and 5.2.0.238 are affected.
9ef2052ed0feac6a9b02205d8939b2c0d2731983696db52d924b4105a07d1cc5
The NSFocus Security Team discovered a remote denial of service vulnerability in ISS RealSecure/BlackICE product lines' detection of the MailSlot Heap Overflow as discussed in MS06-035.
5dfdf3223765450a2bdc73337631272e27ef28cafd53ac721bfcaa511b04ccf4
NSFOCUS Security Advisory (SA2006-05) Microsoft Excel SELECTION Record Memory Corruption Vulnerability
20fa71506e9a522ca77b91f7935e9f6ec81a7f164a36f14b2b8a997524831ec6
NSFOCUS Security Advisory (SA2006-06) Microsoft Excel COLINFO Record Buffer Overflow Vulnerability
c22fd01b6c574e789afe39373dcac66cd697690b15ce3a7a1c12b75d1fe25e72
NSFOCUS Security Advisory (SA2006-04): Microsoft Office GIF Filter Buffer Overflow Vulnerability
f6d7da3823e251f1cb9649c96619caa8d368965ad897a26f45e698b8ccea4bd3
NSFOCUS Security Advisory (SA2006-02): IBM AIX mklvcopy Local Privilege Escalation Vulnerability
62545be78e2bdd657ef035511e3d0d122ea36c621b5faa8bea8ca547dd698287
NSFOCUS Security Advisory (SA2006-03): IBM AIX rm_mlcache_file Local Race Condition Vulnerability
b78993d91feb9e19859cc9ecd3706f50c6b1b0f2cba30dad4fbd09d467c5de4c
NSFOCUS Security Advisory - The NSFocus Security Team has discovered a buffer overflow vulnerability when Winamp processes .m3u files, which might cause Winamp to crash or even execute arbitrary code when a user loads a malicious .m3u file and plays it. Affected software includes Nullsoft Winamp version 5.12 and 5.13.
8dadda208c99cdc53be72be04a2cd2d0749f14f94461308a501d946622836140
NSFOCUS Security Advisory - NSFocus Security Team discovered a security vulnerability in Microsoft Internet Explorer. By crafting a malicious HTML page and alluring users to visit it, a remote attacker can execute arbitrary code with the privilege of the user. Internet Explorer does not properly call interface arguments when instantiating COM component in devenum.dll, resulting in exceptional memory access which might cause IE to crash. Carefully crafted HTML page might allow a remote attacker to execute arbitrary code. Affected are Microsoft Internet Explorer 5.01 SP4, 5.5 SP2, 6, and 6 SP1.
0131b5e2ab757713b9e722795d1a5527462cf0b4dfd3cfd0d6be0d279fc1ca30
NSFOCUS Security Advisory(SA2005-01) - NSFocus Security Team has found a buffer overflow vulnerability in the plug-in by which WinAMP plays CD. An attacker can construct a malicious playlist file that is embedded in a HTML page. If a user is persuaded to click it, then the attacker can gain complete control over the user's system. All versions below 5.08c are affected.
2f4c6c5035b872fd5a2b5de1569a4facb605684f573d63de5e8c86235f56c895
NSFOCUS Security Advisory SA2004-02 - NSFOCUS Security Team found a security vulnerability in the program stmkfont of an HP-UX system. Exploiting this vulnerability, local attackers could gain group bin privileges.
893e2f01859a0283754f25f425a601354a817bdeb90c88bb389baec21e86d022
NSFOCUS Security Advisory SA2003-07 - The HP-UX Software Distributor utilities are susceptible to a buffer overflow vulnerability when reading in the LANG variable since they do not perform any bounds checking on its size. Due to this, local attackers could gain root privileges.
fa7084e4341d66e2414719a1aa4874b255b2255729d312209d47cbdb4f8997bd
NSFOCUS Security Advisory SA2003-08 - Do to a lack of input validation on the NLSPATH variable, libc on HP-UX is susceptible to a format string vulnerability that will allow a local attacker to gain root privileges.
7763824063b03d4c3ebd80f0f6e25b25ad766c35105b7d94923ec0e3e6a15b2b
NSFOCUS Security Advisory SA2003-06 - The NSFOCUS Security Team has found a remotely exploitable buffer overflow vulnerability in the RPC DCOM interface of Microsoft Windows. Exploiting the vulnerability remote attackers could gain local system privileges.
70585563c17300b64273505b039efe0d297c03ce9b48ffb8fa7ca381475a6841
A buffer overflow vulnerability exists in the way a dynamic linking library (ssinc.dll)that is shipped with Microsoft IIS 4.0/5.0 handles the files it contains. Exploiting the vulnerability, local attackers could gain local system privileges.
80719fd500d2b9d91176bd0bb701df5bd2e4fa86a32fd7e6ccc2f7e5f15285f1
NSFOCUS Security Advisory SA2003-03 - A local heap overflow was found in Sun Solaris's CDE manager dtsession which allows local users to execute code as root by setting a long HOME environment variable. Solaris 2.6, 2.7, 2.8, and 2.9 is affected.
d906f6000cf9a6b6bcee5345838232d36117025f3b2186a0a45ac2f0045dbe5a
NSFOCUS Security Advisory SA2003-02 - Sun Solaris LPQ has a stack overflow which allows local users to execute code as root. Solaris 2.5.1, 2.6, and 2.7 on SPARC and x86 is affected.
9ae4c0aec7caa3fc454b9ce6300d39ef37e423e1197c93fd5b339ab5be319e9e
NSFOCUS Security Advisory SA2003-01 - The NSFOCUS Security Team has found a buffer overflow vulnerability in Microsoft Windows XP Redirector that can be exploited locally and can allow attackers to crash the system or gain local system privilege by carefully crafted code.
4bce606470486613bbe2edd6d19c384969079d8be9debbb1f30a27d5174adf73
Proof of concept exploit that demonstrates the xlock heap overflow bug on Solaris versions 2.6, 7, and 8 on SPARC.
bf9e2c6de61ee4d125776384364bbb6fb13b85cfc8b0fcab9e9dd5dced6364ce
Proof of concept exploit that demonstrates the xlock heap overflow bug on Solaris versions 8 on x86.
c6d968271ce21cace85aca6a0e811f68bd4950e9634a6aba411d4c68ad47144f
NSFOCUS Security Advisory (SA2001-01) - The NetScreen Firewall / VPN Appliance has an overflow vulnerability in the web interface which allows remote users to crash the firewall with a large URL. All current versions of ScreenOS, including v1.73r1, 2.0r6, 2.1r3 and 2.5r1 are affected. Perl exploit included. Fix available here.
70f617f094a0ef22f7feb26417d3e3c0d3d45dad8472030861c6f0a3edeae2e5