Microsoft Windows 10 BasicRender.sys denial of service proof of concept exploit.
4fbb7848a946c49a91a49b3f117ad384417e81c96ae67382d1dc8559b366ef0b
Microsoft Windows suffers from an issue where a null pointer deference exists in the WARPGPUCMDSYNC function of the BasicRender.sys driver. An unprivileged user can trigger the vulnerability to crash the system and deny the service to the rest of the users.
ad5e0d10286db68492ef0e44ae5eb98085608264563e59748eabf6defc0bbd19
Microsoft Windows Kernel win32k!NtUserConsoleControl denial of service proof of concept exploit.
47e748a334f6f70e95518c223320b5c7d7cf8bda63d29793d1ec8a9e55c4154b
Microsoft Windows Kernel (win32k.sys) suffers from a local denial of service null pointer vulnerability in NtUserConsoleControl.
86a086e5f1f20c3922d862e53a6241005dcd8473c973a2b52f82a0788801f936
Microsoft Windows 2003 SP2 RRAS SMB remote code execution exploit.
5640691fee55c5d3f683e898c2361f8a438a533891a9627b3ee538e1eb24bb5a
This Metasploit module exploits a stack-based buffer overflow vulnerability in the web interface of Dup Scout Enterprise v9.5.14, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.
46f09d2f260a4c795547b4cce19e1ae4b6b57750101f9224839a951a9912fc72
Microsoft Windows 2003 SP2 ERRATICGOPHER SMB remote code execution exploit.
e09a6f487b36b8b0d05b9379162b5a10008814385417197a29eda6a60fac1a6b
This Metasploit module exploits a stack-based buffer overflow vulnerability in the web interface of DiskSavvy Enterprise versions 9.1.14 and 9.3.14, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This Metasploit module has been tested successfully on Windows XP SP3 and Windows 7 SP1.
303410a6bc0af29da23911eadcd3224ee78a40329f84d26089b70fd706ce9674
This Metasploit module exploits a stack-based buffer overflow vulnerability in the web interface of DiskBoss Enterprise v7.5.12 and v7.4.28, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This Metasploit module has been tested successfully on Windows XP SP3 and Windows 7 SP1.
b39eda053d01cd2ea5a8a4240635cc43fd03d26c356974cf13b3be3a5dc2cc8a
Dup Scout Enterprise version 9.1.14 buffer overflow SEH exploit.
09f037c972288c527580a43c0779237fb87818b52be4fda12e9de4612a86a66c
DiskBoss Enterprise version 7.4.28 GET buffer overflow exploit.
14e13aa97f4a215295ab0b996def24ed7ffe4046ca60bd8503154967f3b9d915
Disk Savvy Enterprise version 9.1.14 GET buffer overflow exploit.
f2688ce63f19950f060c749b66895fe6923125bd1652a0af95a6ff3ae97e39dc
VUPlayer version 2.49 .pls file stack buffer overflow exploit with DEP bypass.
ee1c7e8c354d695397b108f6a9098e64d29ba1236833f715fdd3891a7e7e6ad7