Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Microsoft Windows SMB 2.0 Negotiate Protocol Request Remote BSOD DoS
This module exploits a vulnerability on srv2.sys via a SMB negociation packet.
Read more about Microsoft Windows Schannel Heap Overflow DoS (MS14-066)
This module exploits a vulnerability in "schannel.dll" by sending a crafted certificate packet to the "Internet Information Services" server via TLS protocol producing a heap overflow in the critical LSASS Windows process.
Read more about Microsoft Windows SMB Client Incomplete Response Vulnerability Dos (MS10-020)
This module sends a malformed NetBIOS packet which causes the execution of an infinite loop in the target system
Read more about Microsoft Windows Remote Desktop Protocol DoS (MS12-036)
This modules exploits a kernel vulnerability in Microsoft Remote Desktop server by sending a sequence of specially crafted RDP packets to the target system.
Read more about Microsoft Windows Remote Desktop Protocol DoS (MS12-020)
This module triggers a memory corruption vulnerability in the Remote Desktop Service by sending a malformed packet to the 3389/TCP port.
Read more about Microsoft Windows Registry SymLink DoS (MS010-021)
A denial of service vulnerability exists in the Windows kernel due to the manner in which the kernel processes the values of symbolic links. This module exploits the vulnerability, causing the system to become unresponsive and automatically restart.
Read more about Microsoft Windows Print Spooler Service Format String Vulnerability DoS (MS12-054)
This module exploits a vulnerability in "spoolsv.exe" answering a crafted packet to the target, upon success it will leave the service unavailable.
Read more about Microsoft Windows OpenType Stack Overflow DoS (MS11-032)
This module exploits a kernel stack exhaustion in Microsoft Windows when parsing a specially crafted OpenType font file.
Read more about Microsoft Windows OpenType Engine Infinite Loop DoS (MS12-078)
The OpenType Font driver in Microsoft Windows doesn't sufficiently validate user supplied input, leading to a denial of service vulnerability.
Read more about Microsoft Windows OpenType Font Double Free DoS (MS10-091)
A double free vulnerability in the OpenType Font (OTF) driver in Windows could allow local users to escalate their privileges via a specially crafted OpenType font.

Pagination

  • Previous page ‹‹
  • Page 12
  • Next page ››
Subscribe to Denial of Service
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.