• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

dereference

  1. 1

    Exploits Microsoft Windows Kernel nt!MiOffsetToProtos NULL Pointer Dereference

    The Microsoft Windows kernel suffers from a null pointer dereference vulnerability in nt!MiOffsetToProtos while parsing a malformed PE file. View the full article
  2. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType NULL Pointer Dereference

    Microsoft DirectWrite / AFDKO suffers from a NULL pointer dereferences vulnerability in OpenType font handling while accessing empty dynarrays. View the full article
  3. 1

    Exploits Netwide Assembler (NASM) 2.14rc15 Null Pointer Dereference

    Netwide Assembler (NASM) version 2.14rc15 null pointer dereference proof of concept exploit. View the full article
  4. 1

    Exploits NTPsec 1.1.2 ntp_control Null Pointer Dereference

    NTPsec version 1.1.2 suffer from a null pointer dereference vulnerability in ntp_control. View the full article
  5. 1

    Exploits Microsoft Edge 44.17763.1.0 Null Pointer Dereference

    Microsoft Edge version 44.17763.1.0 suffers from a null pointer dereference vulnerability. View the full article
  6. 1

    Exploits Microsoft Internet Explorer 11 Tree::Notify_InvalidateDisplay Null Pointer Dereference

    Microsoft Internet Explorer 11 suffers from a null pointer dereference vulnerability in Tree::Notify_InvalidateDisplay. View the full article
  7. 1

    Exploits Linux systemd Symlink Dereference Via chown_one()

    Linux suffers from an issue with systemd where chown_one() can dereference symlinks. View the full article
  8. 1

    Exploits Microsoft Windows SetImeInfoEx Win32k NULL Pointer Dereference

    This Metasploit module exploits an elevation of privilege vulnerability that exists in Windows 7 and 2008 R2 when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode. An attacker could...
Back
Top