Microsoft Windows could allow a remote attacker to execute arbitrary code or BSOD the system, caused by a design flaw in the Network File System component.
This module uses ioctls to produce an integer overflow and generate a Denial of Service
This module crashes the target machine producing a blue screen by sending a malformed PPTP packet.
The Windows kernel is prone to a race condition bug when creating/deleting symbolic links, since it does not properly acquire/release kernel locks.
The MODAPI.sys driver in MSI Dragon Center 2.0.104.0 exposes functionality that allows low-privileged users to write an arbitrary value to a Model-Specific Register (MSR) at the specified address via specially crafted IOCTL requests.
This module uses ioctls Write to IO Ports and generate a reboot
This module crashes the target machine producing a blue screen by sending a malformed HTTP packet.
A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client. To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.
This module crashes the target machine producing a blue screen by sending a specially crafted SMB packet
This module uses ioctls to Read/Write to/from IO Ports and generate a reboot
Pagination
- Previous page
- Page 2
- Next page