Agnitum Outpost Security Suite is prone to a privilege-escalation vulnerability that affects the acs.exe service server. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the acs.exe service server process.
tbd. This module allows an agent running in the context of AcroRd32.exe with Low Integrity Level/AppContainer Integrity Level to escalate privileges in order to install a new agent that will run with Medium Integrity Level.
The vulnerability found in Wonderware SuiteLink Service (slssvc.exe) could allow an un-authenticated remote attacker with the ability to connect to the SuiteLink service TCP port to shutdown the service abnormally by sending a malformed packet.
This module exploits a vulnerability in the WireShark openSAFETY dissector, sending a specially crafted openSAFETY packet, causing WireShark to crash.
This module exploits a vulnerability in the WireShark LDAP dissector, sending a specially crafted LDAP packet, causing WireShark to crash.
This module exploits a vulnerability in the WireShark ENTTEC dissector by sending a specially crafted UDP packet.
The DRDA protocol dissector in Wireshark can enter an infinite loop when processing an specially crafted DRDA packet with the iLength field set to 0, causing Wireshark to stop responding.
This module exploits a vulnerability in the WireShark SNMP dissector, sending a specially crafted SNMP packet, causing WireShark to crash.
This module exploits a remote vulnerability that could allow an attacker to send a specially crafted IP message to an affected system causing a denial of service.
Some Windows kernel versions are susceptible to a remote denial-of-service vulnerability. This issue allows remote attackers to crash affected kernels, denying further network service to legitimate users.
Pagination
- Previous page
- Page 152
- Next page