Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Borland AccuRev Reprise License Server activate_doit Command actserver Parameter Buffer Overflow Exploit
The specific flaw exists within the activate_doit function of the service. The issue lies in the handling of the actserver parameter which can result in overflowing a stack-based buffer.
Read more about Netgear ProSafe Network Management System Arbitrary File Upload Vulnerability Exploit
A vulnerability exists in the FileUpload2Controller servlet. This servlet allows unauthenticated file uploads.



By uploading a JSP file, an attacker can achieve remote code execution.

Read more about Easy File Sharing Web Server GET Request Exploit
Easy File Sharing is prone to a buffer-overflow when handling a specially crafted GET request.
Read more about Linux Kernel join_session_keyring Reference Counting Privilege Escalation Exploit
The join_session_keyring() function in security/keys/process_keys.c in the Linux kernel is prone to a reference counter overflow that occurs when a process repeatedly tries to join an already existing keyring.

This vulnerability can be leveraged by local unprivileged attackers to gain root privileges on the affected systems.
Read more about Advantech WebAccess webvrpcs Service DrawSrv TagGroup Buffer Overflow Exploit
The specific flaw exists within the implementation of the 0x280A IOCTL in the DrawSrv subsystem. A stack-based buffer overflow vulnerability exists in a call to strcpy. An attacker can use this vulnerability to execute arbitrary code in the context of an administrator of the system.
Read more about Apple Mac OS X DYLD_PRINT_TO_FILE Privilege Escalation Exploit
This module exploits a vulnerability present in Mac OS X. dyld in Apple OS X before 10.10.5 does not properly validate pathnames in the environment, which allows local users to gain root privileges via the DYLD_PRINT_TO_FILE environment variable.
Read more about Jenkins Default Configuration Remote Code Execution Exploit Update
This module exploits a Jenkins command injection in order to install an agent.



This update adds support for Windows and Linux platforms, and HTTPS support.
Read more about Oracle Application Testing Suite UploadServlet Servlet Remote Code Execution Exploit
A vulnerability exists in the UploadServlet servlet. By providing a filename header containing a directory traversal, an attacker can upload a file to an arbitrary location on the system.

This module abuses the auto deploy feature in the server in order to achieve remote code execution.
Read more about Web App Authentication Testing Improvement
Improvement on Web Application Authentication Testing parameters to use a high number of values between the authentication probes.
Read more about Oracle Application Testing Suite UploadFileAction Servlet Remote Code Execution Exploit
A vulnerability exists in the UploadFileAction servlet. By providing a fileType parameter of "*" to the UploadFileUpload page, an attacker can upload a file to an arbitrary location on the system.

This module abuses the auto deploy feature in the server in order to achieve remote code execution. Also, this module makes use of an authentication bypass vulnerability to perform the attack.

Pagination

  • Previous page ‹‹
  • Page 69
  • Next page ››
Subscribe to Exploits
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Research Article
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.