This module exploits a kernel stack exhaustion in Microsoft Windows when parsing a specially crafted OpenType font file.
The OpenType Font driver in Microsoft Windows doesn't sufficiently validate user supplied input, leading to a denial of service vulnerability.
A double free vulnerability in the OpenType Font (OTF) driver in Windows could allow local users to escalate their privileges via a specially crafted OpenType font.
This module exploits a kernel memory corruption on win32k.sys, allowing remote attackers to restart the computer via a specially crafted EMF image file.
This modules exploits a Windows kernel vulnerability in "nfssvr.sys" by sending a NFS file renaming crafted request to the target.
This module exploits a vulnerability in Microsoft Message Queue Service driver (MQAC.SYS). The IOCTL handler in the MQAC.SYS device driver allows local users to overwrite memory via malformed Interrupt Request Packet (Irp) parameters.
This module exploits a vulnerability in Microsoft Message Queue Service driver (MQAC.SYS). The IOCTL handler in the MQAC.SYS device driver allows local users to overwrite memory via malformed Interrupt Request Packet (Irp) parameters.
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function.
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function.
This module exploits a memory corruption in the Microsoft Windows TCP/IP implementation of ICMPv6 by sending a sequence of TCP/IP packets with a specially crafted Router Advertisement packet. The attack must be issued from the same local net of the target host.
Pagination
- Previous page
- Page 160
- Next page