This module crashes the target machine producing a blue screen by sending a specially crafted SMB packet
Integard Pro is prone to a buffer-overflow vulnerability when handling a crafted POST packet.
This can be exploited to execute arbitrary code with System privileges. It is working until KB4497727 and KB4495666 for Windows 10 x64 v1903
The vulnerability was a buffer overflow in Viper RGB driver.
The vulnerability allows read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.
An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory.
The srv2.sys driver exposes functionality that allows remote users to write arbitrary memory via specially crafted packet and gain the ability to execute code on the target server.
The srv2.sys driver exposes functionality that allows low-privileged users to write arbitrary memory via specially crafted packet and elevate system privileges.
An arbitrary privileged file move operation exists in Microsoft Windows Service Tracing. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Pagination
- Previous page
- Page 25
- Next page