The NSFOCUS Security Team discovered a remote DoS vulnerability in Microsoft Windows kernel. A carefully crafted PE file might crash the operating system.
83bec49a4de3f4a653258a9bd7e85af622119532d20290f8a1c16db95ad42c23
The NSFOCUS Security Team discovered a remote DoS vulnerability in IBM DB2, which will cause IBM DB2 JDBC Applet Server to exit due to out-of-bound access by sending carefully crafted data to the Server.
f95c073409e963ee652e3791ebf0dc1dfa3d3aa8eb6e75386bec4224707968fd
The NSFOCUS Security Team discovered a stack buffer overflow vulnerability in UiPlayer which allows remote attackers to run arbitrary code on user system by crafting a malicious webpage. UiTV UiPlayer UiCheck.dll versions 1.0.0.6 and below are affected.
29aa28c3e6795a7de36c986d330e876e65efa9aac9df5bf85f94d0d4dd022529
Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.
9842b07d7ecd6d2ebf5d42b180dc29e13e74b4b56dd66cf96d7cdb6a0a156b70
Xion Audio Player local buffer overflow proof of concept crash exploit that creates a malicious .m3u file.
6a7147de8eaa0e10b47d126cb86425277a9788cb950ff013d90c1c03ac5060a4
This Metasploit module exploits a stack-based buffer overflow vulnerability in HTTPDX HTTP server 1.4. The vulnerability is caused due to a boundary error within the "h_handlepeer()" function in http.cpp. By sending an overly long HTTP request, an attacker can overrun a buffer and execute arbitrary code.
96eaa8c48e19f5fb3dca4fdb11170227a1757203bb4e06504fea12b4f61860cd