NSFOCUS Security Advisory (SA2000-09) - EZshopper v2.0 and v3.0 from AHG contains remote CGI vulnerabilities which allow an attacker to get directory listings and sensitive file contents. Exploit URL's included.
26cabffb2d71d094476b9be5255376ed3fa9940c9c2776dc3aa0c73a88675d8a
NSFOCUS Security Advisory - The NSFOCUS Security Team discovered a security vulnerability in Microsoft Internet Explorer. This flaw could be used to corrupt memory resulting in application crash and possible code execution by convincing users to open specially crafted HTML files.
304ad6848efcde6c6b6b142064862fe425d9b17265e995651fed164dbf1712c1
The NSFOCUS Security Team discovered a remote DoS vulnerability in Microsoft Windows kernel. A carefully crafted PE file might crash the operating system.
83bec49a4de3f4a653258a9bd7e85af622119532d20290f8a1c16db95ad42c23
The NSFOCUS Security Team discovered a remote DoS vulnerability in IBM DB2, which will cause IBM DB2 JDBC Applet Server to exit due to out-of-bound access by sending carefully crafted data to the Server.
f95c073409e963ee652e3791ebf0dc1dfa3d3aa8eb6e75386bec4224707968fd
The NSFOCUS Security Team discovered a stack buffer overflow vulnerability in UiPlayer which allows remote attackers to run arbitrary code on user system by crafting a malicious webpage. UiTV UiPlayer UiCheck.dll versions 1.0.0.6 and below are affected.
29aa28c3e6795a7de36c986d330e876e65efa9aac9df5bf85f94d0d4dd022529
SEC Consult Security Advisory 20090305-0 - NextApp Echo2 versions below 2.1.1 suffer from a XML injection vulnerability.
e364a88c2cc90f61eeb02c0e5b44a6ff6992024991a758fa3a4903a2fe77a6b5
SEC-CONSULT Security Advisory 20081219-0 - Fujitsu-Siemens WebTransactions is vulnerable to remote command injection due to insufficient input validation. Under certain conditions, WBPublish.exe passes unvalidated user input to the system() function when cleaning up temporary session data. This vulnerability allows an attacker to execute arbitrary commands on the affected system. The vulnerability does not require prior authentication and can be exploited from a web browser.
4fcccde253345cf5e3f0f4106c7f74d8b15fb08e20a6c514630001cb3f299309
SEC Consult Security Advisory 20081210-0 - By calling the extended stored procedure sp_replwritetovarbin, an attacker can write limited values to arbitrary locations in process memory. This vulnerability has been described in a prior security advisory for MS SQL Server 2000.
35360a7acfa1a99b8a092110b58250c85ed5ca8c4ccd0d0b760cbb8a46b38a39
SEC Consult Security Advisory 20081209-0 - Microsoft SQL Server suffers from a limited memory overwrite vulnerability.By calling the extended stored procedure sp_replwritetovarbin, and supplying several uninitialized variables as parameters, it is possible to trigger a memory write to a controlled location. Depending on the underlying Windows version, it is / may be possible to use this vulnerability to execute arbitrary code in the context of the vulnerable SQL server process. In a default configuration, the sp_replwritetovarbin stored procedure is accessible by anyone. The vulnerability can be exploited by an authenticated user with a direct database connection, or via SQL injection in a vulnerable web application. Versions 8.00.2039 and below are affected.
a3cd08ebd8f3b29b9b481794aeae14f29fef4640ab1d53fdd05d480b010bfc47
SEC Consult Security Advisory 20081016-0 - Instant Expert Analysis uses a signed Java applet for Firefox or Netscape browsers and a signed ActiveX plugin for Internet Explorer. Both applets allow an attacker to download and execute arbitrary applications when the user visits an infected website.
4389e14bdabddae18e2fd1658419cc963957c03ba043729d6ea732a805c3413c
The NSFOCUS Security Team has discovered a remote buffer overflow vulnerability in the Cisco Security Agent for Windows which allows remote code execution by sending a malicious SMB request. Cisco Security Agent for Windows versions below 4.5.1.672, 5.0.0.225, 5.1.0.106, and 5.2.0.238 are affected.
9ef2052ed0feac6a9b02205d8939b2c0d2731983696db52d924b4105a07d1cc5
SEC Consult Security Advisory 20071204-0 - SonicWALL Global VPN Client suffers from a format string vulnerability that can be triggered by supplying a specially crafted configuration file. Versions below 4.0.0.830 are vulnerable.
b97b54d87bbc935b01eccf81c297be574aecaedace6de6a4b4127979150d7bba
SEC Consult Security Advisory 20071101-0 - The SonicWALL SSL-VPN solution comes with various ActiveX Controls which allows users to access the VPN with Internet Explorer. These controls contain various vulnerabilities. Some details provided. Vulnerable versions include SonicWALL SSL-VPN 1.3.0.3, WebCacheCleaner ActiveX Control 1.3.0.3, and NeLaunchCtrl ActiveX Control 2.1.0.49.
b43c0aec3d769dbce9e0724d5a99830b17f328ef1c8aa8f7aaea4b93f308d5cd
SEC Consult Security Advisory 20071031-0 - The Perdition Mail Retrieval Proxy versions 1.17 and below suffer from a format string vulnerability.
4efe9018c77b580c8c0bdf7897b14f170b94aec142d3cc6dc57eb1e1f9e4d1f1
SEC Consult Security Advisory 20071012-0 - A specially crafted beacon frame can cause MadWifi to crash and cause a kernel panic on the affected machine. Versions 0.9.3.2 and below are affected.
2883ff9ab631d2d6a0fab31e709208bd4004c0c1c42c5cdd645102b1ba2f8088
The NSFocus Security Team has discovered a memory corruption vulnerability in Internet Explorer 5 that allows arbitrary code execution when parsing a malicious CSS file.
45a8f9aa9d38c801d412958f23324ee611836a6bd70dbf3506a5804651ce34bd
SEC Consult Security Advisory - SEC Consult has discovered an arbitrary code execution flaw in Joomla! version 1.5 beta 2.
27257772ee84bdb082f3c8d0b36b605e8ca0215067cd5b2505a0b873391955c4
SEC Consult Security Advisory 20070509-0 - The Nokia Intellisync Mobile Suite is susceptible to cross site scripting, source code disclosure, and denial of service vulnerabilities. Details provided. Versions known vulnerable include 6.4.31.2, 6.6.0.107, and 6.6.2.2.
51a25ba5752d84a5e2041a75ccb577608b5f1dc5ff208d33097a57a267d97907
SEC Consult Security Advisory 20070314-0 - If the Apache HTTP Server and Tomcat are configured to interoperate with the common proxy modules (mod_proxy, mod_rewrite, mod_jk), an attacker might be able to break out of the intended destination path up to the webroot in Tomcat.
ae0accd7dd41279f8531f981d7995776526f842a5d6e404b34ae2a7019a86a97
SEC-CONSULT Security Advisory 20070309-0 - Starting with version 5, MySQL provides access to the database metadata. When using functions that operate on strings in combination with subselects on information_schema tables and additional sorting of the results with the ORDER BY clause, a null-pointer dereferencation takes place causing a segmentation fault. This allows an attacker to crash the MySQL database. Versions below 5.0.37 are affected.
d00c6845f154920b81fdf6e0a349fb00b0670947308e18f0a2d4970997894dbb
SEC Consult Security Advisory 20070226-0 - The 3rd party module Pagesetter for PostNuke is susceptible to a local file inclusion vulnerability. Versions 6.2.0 and 6.3.0 beta 5 are affected.
575fbb65bb1e067007269f53fe512d45d47ee97dd535d2999d2ace632822781a
The NSFocus Security Team has discovered a buffer overflow in Internet Explorer 6.0SP1 which allows for remote code execution via an overly-long URL.
31fc275e9263e8f91f3d87e178c5156ac1db384edfb575d3dd5c89172145c2ef
The NSFocus Security Team discovered a remote denial of service vulnerability in ISS RealSecure/BlackICE product lines' detection of the MailSlot Heap Overflow as discussed in MS06-035.
5dfdf3223765450a2bdc73337631272e27ef28cafd53ac721bfcaa511b04ccf4
Secunia Security Advisory - NSFocus Security Team has reported a vulnerability in various RealSecure/BlackICE products, which can be exploited by malicious people to cause a DoS (Denial of Service).
cc3d8fff0cd269c06cf032c90d12771b3062cded6170fd0ff17c287b51d8e768
NSFOCUS Security Advisory (SA2006-05) Microsoft Excel SELECTION Record Memory Corruption Vulnerability
20fa71506e9a522ca77b91f7935e9f6ec81a7f164a36f14b2b8a997524831ec6
NSFOCUS Security Advisory (SA2006-06) Microsoft Excel COLINFO Record Buffer Overflow Vulnerability
c22fd01b6c574e789afe39373dcac66cd697690b15ce3a7a1c12b75d1fe25e72