This module exploits a NULL pointer dereference in NVIDIA Reality Server Software, when a crafted package is send to port 1935.
This module shuts down the novell-tftp.exe server because it fails to properly handle user-supplied malformed packets.
nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
This module exploits a vulnerability in the Microsoft Windows NAT Helper Component (ipnathlp.dll) when Internet Connection Sharing is enabled, sending a specially crafted DNS query.
This module exploits an improperly memory free by sending a specially crafted RPC packet to cause a DoS condition on the target machine.
This module exploits a stack buffer overflow in the Microsoft Windows Plug and Play service and crashes services.exe.
This module exploits an incorrect check in the MIDL_user_allocate function of MSDTCPRXY.DLL to crash the MSDTC service.
This module exploits a vulnerability on "wins.exe" sending a DNS request packet followed by a RESET connection. When the WINS service tries to answer this request, the "send" function fails and an exception is produced triggering the bug. At the end, the WINS port ( port 42 ) is verified to know if the service is listening or it was broken.
This module causes a BSOD in Microsoft Windows when parsing a specially crafted OpenType font file. Only x64 systems are affected by this vulnerability.
This module exploits a vulnerability on win32k.sys sending a crafted message from user to kernel.
Pagination
- Previous page
- Page 111
- Next page