Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Microsoft Windows OpenType Stack Overflow DoS (MS11-032)
This module exploits a kernel stack exhaustion in Microsoft Windows when parsing a specially crafted OpenType font file.
Read more about Microsoft Windows OpenType Engine Infinite Loop DoS (MS12-078)
The OpenType Font driver in Microsoft Windows doesn't sufficiently validate user supplied input, leading to a denial of service vulnerability.
Read more about Microsoft Windows OpenType Font Double Free DoS (MS10-091)
A double free vulnerability in the OpenType Font (OTF) driver in Windows could allow local users to escalate their privileges via a specially crafted OpenType font.
Read more about Microsoft Windows NtGdiFastPolyPolyline memory corruption DoS (MS09-006)
This module exploits a kernel memory corruption on win32k.sys, allowing remote attackers to restart the computer via a specially crafted EMF image file.
Read more about Microsoft Windows NFS NULL Dereference DoS (MS13-014)
This modules exploits a Windows kernel vulnerability in "nfssvr.sys" by sending a NFS file renaming crafted request to the target.
Read more about Microsoft Windows MSMQ Null Pointer DoS WatchDog
This module exploits a vulnerability in Microsoft Message Queue Service driver (MQAC.SYS). The IOCTL handler in the MQAC.SYS device driver allows local users to overwrite memory via malformed Interrupt Request Packet (Irp) parameters.
Read more about Microsoft Windows MSMQ Null Pointer DoS (MS09-040)
This module exploits a vulnerability in Microsoft Message Queue Service driver (MQAC.SYS). The IOCTL handler in the MQAC.SYS device driver allows local users to overwrite memory via malformed Interrupt Request Packet (Irp) parameters.
Read more about Microsoft Windows MiCreatePagingFileMap DoS WatchDog
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function.
Read more about Microsoft Windows MiCreatePagingFileMap DoS (MS09-058)
This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function.
Read more about Microsoft Windows ICMPv6 Router Advertisement Remote DoS (MS10-009)
This module exploits a memory corruption in the Microsoft Windows TCP/IP implementation of ICMPv6 by sending a sequence of TCP/IP packets with a specially crafted Router Advertisement packet. The attack must be issued from the same local net of the target host.

Pagination

  • Previous page ‹‹
  • Page 160
  • Next page ››
Subscribe to Impact
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.