This module exploits a vulnerability in the udp_sendmsg function in the UDP implementation in net/ipv4/udp.c and net/ipv6/udp.c in the Linux kernel before 2.6.19 allowing local users to gain privileges via vectors involving the MSG_MORE flag and a UDP socket.
This module exploits a buffer overflow vulnerability in Panda Internet Security RKPavProc.sys driver when handling a specially crafted IOCTL request. This vulnerability allows unprivileged local users to execute code with SYSTEM privileges.
This module exploits a missing verification of the path in the command "sudoedit", provided by the sudo package. This can be exploited to execute any command as root including a shell, allowing an unprivileged process to elevate its privileges to root.
This update adds OSX 10.6 (Snow Leopard) as supported target.
This update adds OSX 10.6 (Snow Leopard) as supported target.
FreeBSD is prone to multiple stack-based buffer-overflow vulnerabilities because the kernel fails to perform adequate boundary checks on user-supplied data.
If the system is configured to allow unprivileged users to mount file
systems, it is possible for a local adversary to exploit this
vulnerability and execute code in the context of the kernel.
This update fixs some issues and adds validations pre-explotation.
If the system is configured to allow unprivileged users to mount file
systems, it is possible for a local adversary to exploit this
vulnerability and execute code in the context of the kernel.
This update fixs some issues and adds validations pre-explotation.
This update improves the exploit reliability and adds support to Windows XP SP2.
This module exploits a vulnerability in win32k.sys when a "window" is created.
This module exploits a vulnerability in win32k.sys when a "window" is created.
This module exploits a vulnerability in win32k.sys when a "window" is created.
WARNING: This is an early release module. This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a format string vulnerability in CUPS lppasswd in Apple Mac OS X 10.5.6 that allows local users to get code execution with elevated privileges.
This module exploits a denial of service vulnerability in the Windows kernel related to the way the kernel processes values of registry symbolic links.
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function.
The 'udev' Linux application is prone to a local privilege-escalation vulnerability because it fails to properly handle netlink messages.
Local attackers may exploit this issue to gain elevated privileges, which may lead to a complete compromise of the system.
This update fixs a module's bug.
Local attackers may exploit this issue to gain elevated privileges, which may lead to a complete compromise of the system.
This update fixs a module's bug.
Pagination
- Previous page
- Page 40
- Next page