Due to insuficient checks when accessing the memory of a process vi /proc/PID/mem the linux kernel is prone to a privilige escalation.
This module exploits a Windows kernel heap overflow vulnerability when a crafted TTF file is processed by Windows kernel.
This update adds support to Microsoft Windows Vista, Microsoft Windows 2008 and Microsoft Windows 7.
When a crafted TTF file is processed by Windows kernel it produces a stack exhaustion finishing it in a BSoD.
When a crafted TTF file is processed by Windows kernel it produces a stack exhaustion finishing it in a BSoD.
This update adds support to Microsoft Windows Vista and Microsoft Windows 2008.
When a crafted ".fon" file is loaded by Windows Kernel this produces a kernel heap overflow.
This module exploits this vulnerability by filling the kernel memory via heap spraying and building a fake chunk header.
When a crafted ".fon" file is loaded by Windows Kernel this produces a kernel heap overflow.
This module exploits this vulnerability by filling the kernel memory via heap spraying and building a fake chunk header.
When a crafted TTF file is processed by Windows kernel it produces a stack exhaustion finishing it in a BSoD.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
When a crafted ".fon" file is loaded by Windows Kernel this produces a kernel heap overflow.
This module exploits this vulnerability filling the kernel memory via heap spraying and building a fake chunk header.
This module exploits this vulnerability filling the kernel memory via heap spraying and building a fake chunk header.
The Ancillary Function Driver (AFD.sys) present in Microsoft Windows is vulnerable to an arbitrary pointer overwrite. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by sending a specially crafted IOCTL to the vulnerable driver.
This update adds support for Windows 2003.
This update adds support for Windows 2003.
This module exploits a local vulnerability in Trend Micro IWSS to gain elevated privileges on the affected computer.
The Ancillary Function Driver (AFD.sys) present in Microsoft Windows is vulnerable to an arbitrary pointer overwrite. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by sending a specially crafted IOCTL to the vulnerable driver.
This update adds support for Windows 2003.
This update adds support for Windows 2003.
The Ancillary Function Driver (AFD.sys) present in Microsoft Windows is vulnerable to an arbitrary pointer overwrite. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by sending a specially crafted IOCTL to the vulnerable driver.
Pagination
- Previous page
- Page 34
- Next page