Description: Microsoft Windows NT NtVdmControl()->KiTrap0D ring0 Exploit
受影响的操作系统:
- Windows 2000
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7 32Bit
不受影响的操作系统:
-Windows 7 64Bit
-Windows Server 2008 R2 64Bit
-Windows Server 2008 R2 安腾架构
-Microsoft Windows NT NtVdmControl ()-> KiTrap0D ring0 Exploit.
Affected operating systems:
- Windows 2000
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7 32Bit
Not affected operating systems:
-Windows 7 for x64-based Systems
-Windows Server 2008 R2 for x64-based Systems
-Windows Server 2008 R2 for Itanium-based Systems Platform: |
Size: 72704 |
Author:0day |
Hits:
Description: 一个windows本地提权漏洞,影响从Windows nt到Windows 8,利用漏洞接替了系统内核拿到最高权限-Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ local ring0 exploit
There s a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the
// PATHREC object returned by win32k!EPATHOBJ::newpathrec doesn t initialise the
next list pointer. The bug is really nice, but exploitation when
allocations start failing is tricky. Platform: |
Size: 10240 |
Author:linzhijie |
Hits:
Description: This module exploits an out of bounds function table dereference in the SMB
request validation code of the SRV2.SYS driver included with Windows Vista,
Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2.
Windows Vista without SP1 does not seem affected by this flaw. Platform: |
Size: 62464 |
Author:gxcv888 |
Hits: