Symantec Workspace Virtualization version 6.4.1895.0 local kernel mode privilege escalation exploit.
f34f6ca8bbdca39830d0989067fe1fd85f518a6ff01379b69ea72a1c01e5f5b9
Kingsoft AntiVirus 2012 KisKrnl.sys versions 2011.7.8.913 and below local kernel mode privilege escalation exploit.
9d7b340d71c50c87f2f1c7b9ede1151660b6b9dbb1ac032dcdc173e51908c3b4
Kingsoft AntiVirus 2011 SP5.2 KisKrnl.sys versions 2011.1.13.89 and below local kernel mode denial of service exploit.
1e25fc7a0416c984cca57aa50d30eec88a510d4ffb20b26d651889869528a98c
ESTsoft ALYac Anti-Virus 1.5 versions 5.0.1.2 and below local kernel mode privilege escalation exploit.
3f2ad9346053fe68522b374ee5555a7073ebc22d57e5e70dd6876d32348fda11
ViRobot Desktop version 5.5 and Server version 3.5 local kernel mode privilege escalation exploit.
43b2f4d9655eba5b3ad8440b6a03d204684557b7a8a87dc810c8ac66864da14c
NProtect Anti-Virus 2007 versions 2010.5.11.1 and below local kernel mode privilege escalation exploit.
7aa3139aa141fd361b9e82cc2ef15b355832b22280cf778db25220451462bc33
AhnLab V3 Internet Security versions 8.0.3.28 and below local kernel mode privilege escalation exploit.
f88b271f50becd28f0e4c69664d429db408ede575ed745aea9362f6b33b6e6f0
Microsoft Windows SfnLOGONNOTIFY proof of concept privilege escalation exploit based on the vulnerability discussed in MS10-048.
091c2b1f603ada446c0678d9b4df40e311ac6f36eea39da1e834d4e1eb26e299
win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnINSTRING.
8d49e75fafb15af8fbb7cd207f24cd9d557bfdc9f69ada8a2863fae1e5bb1ad2
win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnLOGONNOTIFY.
87330502340ae2d4d870ba5f24b26d6f4b4ea3616b2f8f96cd4f764ef765421e
Micropoint Proactive Defense Mp110013.sys versions 1.3.10123.0 and below local privilege escalation exploit.
cb1f02645b6edceddb222c851229894bc776510a193db2fb91b36d9eea0bd3ad