This module exploits a stack overflow on kernel mode on win32k.sys via an unspecified desktop parameter.
This module exploits a vulnerability in the way that the Windows OpenType Font (OTF) format driver improperly parses specially crafted OpenType fonts.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
An elevation of privilege vulnerability exists when Windows places incorrect access control lists (ACLs) on the registry keys for the Tracing Feature for Services. The vulnerability allows local attackers running code under an account with impersonation rights, like NETWORK SERVICE, to gain SYSTEM privileges.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This update adds support to Microsoft Windows Vista and Microsoft Windows 2008.
This module exploits a vulnerability in win32k.sys when a "window" is created.
This module exploits a vulnerability in win32k.sys when a "window" is created.
Linux kernel is prone to a local privilege-escalation vulnerability because the software fails to verify access permissions.
A local user can invoke the Ext4 'move extents' ioctl call, with certain options to execute arbitrary code and gain privileged access.
Successful exploits will result in the complete compromise of affected computers.
A local user can invoke the Ext4 'move extents' ioctl call, with certain options to execute arbitrary code and gain privileged access.
Successful exploits will result in the complete compromise of affected computers.
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function CreateDIBPalette.
PAM MOTD module in Ubuntu did not correctly handle path permissions when creating user file stamps.A local attacker could exploit this to gain root privileges.
This update adds support to Microsoft Windows 2003.
This module exploits a vulnerability on win32k.sys when the "CreateWindow" function is called.
This module exploits a vulnerability on win32k.sys when the "CreateWindow" function is called.
This module exploits a vulnerability on win32k.sys when the "CreateWindow" function is called.
Avast! Internet Security is prone to a local denial-of-service vulnerability. Local attackers can exploit this issue to cause denial-of-service conditions.
Pagination
- Previous page
- Page 39
- Next page