exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files from NSFOCUS

Email addresssecurity at nsfocus.com
First Active2000-07-26
Last Active2011-06-15
NSFOCUS Security Advisory 2011.1
Posted Jun 15, 2011
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory - The NSFOCUS Security Team discovered a security vulnerability in Microsoft Internet Explorer. This flaw could be used to corrupt memory resulting in application crash and possible code execution by convincing users to open specially crafted HTML files.

tags | advisory, code execution
advisories | CVE-2011-1250
SHA-256 | 304ad6848efcde6c6b6b142064862fe425d9b17265e995651fed164dbf1712c1
NSFOCUS Security Advisory 2009.3
Posted Oct 16, 2009
Authored by NSFOCUS, Liu Yexin, Tan Jingli | Site nsfocus.com

The NSFOCUS Security Team discovered a remote DoS vulnerability in Microsoft Windows kernel. A carefully crafted PE file might crash the operating system.

tags | advisory, remote, denial of service, kernel
systems | windows
advisories | CVE-2009-2516
SHA-256 | 83bec49a4de3f4a653258a9bd7e85af622119532d20290f8a1c16db95ad42c23
NSFOCUS Security Advisory 2009.2
Posted Oct 16, 2009
Authored by NSFOCUS, Liu Yexin | Site nsfocus.com

The NSFOCUS Security Team discovered a remote DoS vulnerability in IBM DB2, which will cause IBM DB2 JDBC Applet Server to exit due to out-of-bound access by sending carefully crafted data to the Server.

tags | advisory, remote, denial of service
advisories | CVE-2009-2971
SHA-256 | f95c073409e963ee652e3791ebf0dc1dfa3d3aa8eb6e75386bec4224707968fd
NSFOCUS Security Advisory 2009.1
Posted Oct 16, 2009
Authored by NSFOCUS, Yu Yang | Site nsfocus.com

The NSFOCUS Security Team discovered a stack buffer overflow vulnerability in UiPlayer which allows remote attackers to run arbitrary code on user system by crafting a malicious webpage. UiTV UiPlayer UiCheck.dll versions 1.0.0.6 and below are affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2009-2970
SHA-256 | 29aa28c3e6795a7de36c986d330e876e65efa9aac9df5bf85f94d0d4dd022529
NSFOCUS Security Advisory 2007.2
Posted Dec 7, 2007
Authored by NSFOCUS | Site nsfocus.com

The NSFOCUS Security Team has discovered a remote buffer overflow vulnerability in the Cisco Security Agent for Windows which allows remote code execution by sending a malicious SMB request. Cisco Security Agent for Windows versions below 4.5.1.672, 5.0.0.225, 5.1.0.106, and 5.2.0.238 are affected.

tags | advisory, remote, overflow, code execution
systems | cisco, windows
advisories | CVE-2007-5580
SHA-256 | 9ef2052ed0feac6a9b02205d8939b2c0d2731983696db52d924b4105a07d1cc5
NSFOCUS Security Advisory 2006.7
Posted Jul 28, 2006
Authored by NSFOCUS, Chen Qing | Site nsfocus.com

The NSFocus Security Team discovered a remote denial of service vulnerability in ISS RealSecure/BlackICE product lines' detection of the MailSlot Heap Overflow as discussed in MS06-035.

tags | advisory, remote, denial of service, overflow
advisories | CVE-2006-3840
SHA-256 | 5dfdf3223765450a2bdc73337631272e27ef28cafd53ac721bfcaa511b04ccf4
NSFOCUS Security Advisory 2006.5
Posted Jul 13, 2006
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2006-05) Microsoft Excel SELECTION Record Memory Corruption Vulnerability

tags | advisory
SHA-256 | 20fa71506e9a522ca77b91f7935e9f6ec81a7f164a36f14b2b8a997524831ec6
NSFOCUS Security Advisory 2006.6
Posted Jul 13, 2006
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2006-06) Microsoft Excel COLINFO Record Buffer Overflow Vulnerability

tags | advisory, overflow
SHA-256 | c22fd01b6c574e789afe39373dcac66cd697690b15ce3a7a1c12b75d1fe25e72
NSFOCUS Security Advisory 2006.4
Posted Jul 13, 2006
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2006-04): Microsoft Office GIF Filter Buffer Overflow Vulnerability

tags | advisory, overflow
SHA-256 | f6d7da3823e251f1cb9649c96619caa8d368965ad897a26f45e698b8ccea4bd3
NSFOCUS Security Advisory 2006.2
Posted Apr 28, 2006
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2006-02): IBM AIX mklvcopy Local Privilege Escalation Vulnerability

tags | advisory, local
systems | aix
SHA-256 | 62545be78e2bdd657ef035511e3d0d122ea36c621b5faa8bea8ca547dd698287
NSFOCUS Security Advisory 2006.3
Posted Apr 28, 2006
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2006-03): IBM AIX rm_mlcache_file Local Race Condition Vulnerability

tags | advisory, local
systems | aix
SHA-256 | b78993d91feb9e19859cc9ecd3706f50c6b1b0f2cba30dad4fbd09d467c5de4c
NSFOCUS Security Advisory 2006.1
Posted Feb 26, 2006
Authored by NSFOCUS, Liu Yexin | Site nsfocus.com

NSFOCUS Security Advisory - The NSFocus Security Team has discovered a buffer overflow vulnerability when Winamp processes .m3u files, which might cause Winamp to crash or even execute arbitrary code when a user loads a malicious .m3u file and plays it. Affected software includes Nullsoft Winamp version 5.12 and 5.13.

tags | advisory, overflow, arbitrary
advisories | CVE-2006-0720
SHA-256 | 8dadda208c99cdc53be72be04a2cd2d0749f14f94461308a501d946622836140
NSFOCUS Security Advisory 2005.2
Posted Aug 11, 2005
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory - NSFocus Security Team discovered a security vulnerability in Microsoft Internet Explorer. By crafting a malicious HTML page and alluring users to visit it, a remote attacker can execute arbitrary code with the privilege of the user. Internet Explorer does not properly call interface arguments when instantiating COM component in devenum.dll, resulting in exceptional memory access which might cause IE to crash. Carefully crafted HTML page might allow a remote attacker to execute arbitrary code. Affected are Microsoft Internet Explorer 5.01 SP4, 5.5 SP2, 6, and 6 SP1.

tags | advisory, remote, arbitrary
advisories | CVE-2005-1990
SHA-256 | 0131b5e2ab757713b9e722795d1a5527462cf0b4dfd3cfd0d6be0d279fc1ca30
NSFOCUS Security Advisory 2005.1
Posted Jan 28, 2005
Authored by NSFOCUS, Yu Yang | Site nsfocus.com

NSFOCUS Security Advisory(SA2005-01) - NSFocus Security Team has found a buffer overflow vulnerability in the plug-in by which WinAMP plays CD. An attacker can construct a malicious playlist file that is embedded in a HTML page. If a user is persuaded to click it, then the attacker can gain complete control over the user's system. All versions below 5.08c are affected.

tags | advisory, overflow
advisories | CVE-2004-1150
SHA-256 | 2f4c6c5035b872fd5a2b5de1569a4facb605684f573d63de5e8c86235f56c895
NSFOCUS Security Advisory 2004.2
Posted Oct 27, 2004
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2004-02 - NSFOCUS Security Team found a security vulnerability in the program stmkfont of an HP-UX system. Exploiting this vulnerability, local attackers could gain group bin privileges.

tags | advisory, local
systems | hpux
advisories | CVE-2004-0965
SHA-256 | 893e2f01859a0283754f25f425a601354a817bdeb90c88bb389baec21e86d022
sa2003-07.txt
Posted Nov 14, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-07 - The HP-UX Software Distributor utilities are susceptible to a buffer overflow vulnerability when reading in the LANG variable since they do not perform any bounds checking on its size. Due to this, local attackers could gain root privileges.

tags | advisory, overflow, local, root
systems | hpux
advisories | CVE-2003-0089
SHA-256 | fa7084e4341d66e2414719a1aa4874b255b2255729d312209d47cbdb4f8997bd
sa2003-08.txt
Posted Nov 14, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-08 - Do to a lack of input validation on the NLSPATH variable, libc on HP-UX is susceptible to a format string vulnerability that will allow a local attacker to gain root privileges.

tags | advisory, local, root
systems | hpux
advisories | CVE-2003-0090
SHA-256 | 7763824063b03d4c3ebd80f0f6e25b25ad766c35105b7d94923ec0e3e6a15b2b
sa2003-06.txt
Posted Sep 13, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-06 - The NSFOCUS Security Team has found a remotely exploitable buffer overflow vulnerability in the RPC DCOM interface of Microsoft Windows. Exploiting the vulnerability remote attackers could gain local system privileges.

tags | advisory, remote, overflow, local
systems | windows
SHA-256 | 70585563c17300b64273505b039efe0d297c03ce9b48ffb8fa7ca381475a6841
NSSA-200305.txt
Posted May 31, 2003
Authored by NSFOCUS | Site nsfocus.com

A buffer overflow vulnerability exists in the way a dynamic linking library (ssinc.dll)that is shipped with Microsoft IIS 4.0/5.0 handles the files it contains. Exploiting the vulnerability, local attackers could gain local system privileges.

tags | advisory, overflow, local
SHA-256 | 80719fd500d2b9d91176bd0bb701df5bd2e4fa86a32fd7e6ccc2f7e5f15285f1
sa2003-03.txt
Posted Apr 1, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-03 - A local heap overflow was found in Sun Solaris's CDE manager dtsession which allows local users to execute code as root by setting a long HOME environment variable. Solaris 2.6, 2.7, 2.8, and 2.9 is affected.

tags | advisory, overflow, local, root
systems | solaris
SHA-256 | d906f6000cf9a6b6bcee5345838232d36117025f3b2186a0a45ac2f0045dbe5a
sa2003-02.txt
Posted Apr 1, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-02 - Sun Solaris LPQ has a stack overflow which allows local users to execute code as root. Solaris 2.5.1, 2.6, and 2.7 on SPARC and x86 is affected.

tags | advisory, overflow, x86, local, root
systems | solaris
advisories | CVE-2003-0091
SHA-256 | 9ae4c0aec7caa3fc454b9ce6300d39ef37e423e1197c93fd5b339ab5be319e9e
sa2003-01.txt
Posted Mar 29, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-01 - The NSFOCUS Security Team has found a buffer overflow vulnerability in Microsoft Windows XP Redirector that can be exploited locally and can allow attackers to crash the system or gain local system privilege by carefully crafted code.

tags | exploit, overflow, local
systems | windows
SHA-256 | 4bce606470486613bbe2edd6d19c384969079d8be9debbb1f30a27d5174adf73
xlock Heap Overflow For Solaris SPARC
Posted Dec 31, 2001
Authored by NSFOCUS | Site nsfocus.com

Proof of concept exploit that demonstrates the xlock heap overflow bug on Solaris versions 2.6, 7, and 8 on SPARC.

tags | exploit, overflow, proof of concept
systems | solaris
SHA-256 | bf9e2c6de61ee4d125776384364bbb6fb13b85cfc8b0fcab9e9dd5dced6364ce
xlock Heap Overflow For Solaris x86
Posted Dec 31, 2001
Authored by NSFOCUS | Site nsfocus.com

Proof of concept exploit that demonstrates the xlock heap overflow bug on Solaris versions 8 on x86.

tags | exploit, overflow, x86, proof of concept
systems | solaris
SHA-256 | c6d968271ce21cace85aca6a0e811f68bd4950e9634a6aba411d4c68ad47144f
sa2001_01.txt
Posted Jan 9, 2001
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2001-01) - The NetScreen Firewall / VPN Appliance has an overflow vulnerability in the web interface which allows remote users to crash the firewall with a large URL. All current versions of ScreenOS, including v1.73r1, 2.0r6, 2.1r3 and 2.5r1 are affected. Perl exploit included. Fix available here.

tags | remote, web, overflow, perl
SHA-256 | 70f617f094a0ef22f7feb26417d3e3c0d3d45dad8472030861c6f0a3edeae2e5
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close