This module exploits a vulnerability in Microsoft Message Queue Service driver (MQAC.SYS). The IOCTL handler in the MQAC.SYS device driver allows local users to overwrite memory via malformed Interrupt Request Packet (Irp) parameters.
This module exploits a vulnerability in Microsoft Message Queue Service driver (MQAC.SYS). The IOCTL handler in the MQAC.SYS device driver allows local users to overwrite memory via malformed Interrupt Request Packet (Irp) parameters.
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function.
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function.
This module hooks a function of the guest OS network driver. When this function is called, it sends a packet to the host through the "vmbus mechanism". This hook modifies the packet before being sent to the host. Then, a host driver ( vmswitch.sys ) processes this "modified packet" and it ends crashing the host.
This module hooks a function of the guest OS network driver. When this function is called, it sends a packet to the host through the "vmbus mechanism". This hook modifies the packet before being sent to the host. Then, a host driver ( vmswitch.sys ) processes this "modified packet" and it ends producing a non responsiveness effect on the all virtual machines running at the time.
This module exploits a vulnerability in "hvix64.sys" ( Hyper-V hypervisor ) by executing a VMCALL instruction with crafted parameters.
This module causes a BSOD in Microsoft Windows when parsing a specially crafted .FON font file.
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function.
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function CreateDIBPalette.
Pagination
- Previous page
- Page 40
- Next page