The Ancillary Function Driver (AFD.sys) present in Microsoft Windows is vulnerable to an arbitrary pointer overwrite. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by sending a specially crafted IOCTL to the vulnerable driver.
This module adds support to Microsoft Windows 2008.
This module exploits a vulnerability on Microsoft WINS service sending crafted UDP packets to the WINS-RPC local port.
This module exploits a vulnerability on Microsoft WINS service sending crafted UDP packets to the WINS-RPC local port.
This module causes a BSOD in Microsoft Windows when parsing a specially crafted .FON font file.
This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a vulnerability on win32k.sys sending a crafted message from user to kernel.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Norman Security Suite is affected by a privilege escalation vulnerability that can be exploited by local, unprivileged users to gain SYSTEM privileges.
The vulnerability occurs in the Nprosec.sys driver when handling IOCTL 0x00220210.
The vulnerability occurs in the Nprosec.sys driver when handling IOCTL 0x00220210.
The Protected Mode of Microsoft Internet Explorer can be bypassed by exploiting a logical flaw when checking the Integrity Level of a file.
This module allows an agent running in the context of iexplore.exe with Low Integrity Level to install a new agent that will run with Medium Integrity Level.
This module allows an agent running in the context of iexplore.exe with Low Integrity Level to install a new agent that will run with Medium Integrity Level.
This module exploits a vulnerability on Microsoft WINS service sending crafted UDP packets to the WINS-RPC local port.
This module exploits a local vulnerability in the set_fs function in the Linux kernel prior to 2.6.37.
This module exploits a vulnerability on Microsoft Windows "CSRSS.EXE" process setting the command history number in a value greater than 0x7fff.
The Protected Mode feature of Microsoft Internet Explorer can be bypassed by running an XBAP application from the local filesystem. This module allows an agent running with Low Integrity Level to install a new agent that will run with Medium Integrity Level.
Pagination
- Previous page
- Page 35
- Next page