This module exploits an integer overflow in srvnet.sys Windows driver by sending a crafted SMB request to the Windows SMB Server.
This module exploits a vulnerability while handling TKEY queries in the BIND service to cause a DoS.
This module exploits a vulnerability in the ClearSCADA Server service by sending a malformed packet to the 5481/TCP port to crash the application.
This Update increases the MAX TRIES default value because it has not been reliable.
This Update increases the MAX TRIES default value because it has not been reliable.
This update adds a Wi-Fi Direct DoS attack to Android devices(CVE-2014-0997).
This module exploits a double free vulnerability in win32k.sys, allowing an unprivileged local user to cause a BSOD.
This module exploits a Integer Overflow vulnerability in the HTTP Server by sending a malformed packet to the 80/TCP port to crash the application.
A stack-based buffer overflow in the ProcessDataReceivedOnSocket function in the Microsoft Telnet Server Helper (tlntsess.exe) can be used by remote unauthenticated attackers to render the Telnet server unresponsive.
This update improves the way in which this module detects if the attack was successful.
This update improves the way in which this module detects if the attack was successful.
A stack-based buffer overflow in the ProcessDataReceivedOnSocket function in the Microsoft Telnet Server Helper (tlntsess.exe) can be used by remote unauthenticated attackers to render the Telnet server unresponsive.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a vulnerability in "schannel.dll" by sending a crafted certificate packet to the "Internet Information Services" server via TLS protocol producing a heap overflow in the critical LSASS Windows process.
This update reduces the time of the target exploitation.
Besides, all targets supported are added in the documentation.
This update reduces the time of the target exploitation.
Besides, all targets supported are added in the documentation.
This module exploits a vulnerability in "schannel.dll" by sending a crafted certificate packet to the "Internet Information Services" server via TLS protocol producing a heap overflow in the critical LSASS Windows process.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released versionin order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released versionin order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Pagination
- Previous page
- Page 5
- Next page