Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Microsoft Windows Common Log File System Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-38196)
The Common Log File System Driver (clfs.sys) present in Microsoft Windows is vulnerable to a memory corruption vulnerability. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by creating a specially crafted base log file.
Read more about Windows Common Log File System Driver LoadContainerQ Elevation of Privilege Vulnerability Exploit
This module exploits a vulnerability in the LoadContainerQ function within clfs.sys. The root cause of this vulnerability is that LoadContainerQ uses CLFS_CONTAINER_CONTEXT.pContainer without verifying whether the FlushImage function has invalidated the General Metadata Block.
Read more about Microsoft Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-38144)
An elevation of privilege vulnerability exists due to the MS KS WOW Thunk kernel module allowing an integer overflow which can lead into a buffer overflow. The vulnerability could allow an attacker to run code with elevated privileges.
Read more about Microsoft Windows Ancillary Function Driver UAF Privilege Excalation Exploit (CVE-2024-38193)
A critical use-after-free vulnerability in the Windows Ancillary Function Driver (afd.sys), allows attackers to escalate privileges. It stems from a race condition in the Registered I/O (RIO) extension for Windows sockets, between the functions AfdRioGetAndCacheBuffer() and AfdRioDereferenceBuffer().
Read more about Microsoft Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-30090)
An elevation of privilege vulnerability exists due to the MS KS WOW Thunk kernel module allowing untrusted pointer dereference. The vulnerability could allow an attacker to run code with elevated privileges.
Read more about Windows Ks Driver KSPROPERTY Privilege Escalation Exploit
A vulnerability in Kernel Streaming (ks.sys driver) allows arbitrary IOCTL_KS_PROPERTY operations. A double fetch vulnerability in KspPropertyHandler, can be used to gain system privileges.
Read more about Microsoft Windows Telephony Server Use After Free Local Privilege Escalation Exploit
Use-after-free vulnerability in the telephony service can lead to a Local Privilege Escalation in TapiSrv.
Read more about Microsoft Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Exploit
An elevation of privilege vulnerability exists due to the MS KS WOW Thunk kernel module allow accessing memory out of bounds. The vulnerability could allow an attacker to run code with elevated privileges.
Read more about Windows System Drive Remapping Local Privilege Escalation Exploit Update
This update adds support for domain users, improved user group validation, agent stability, and improved module output messages.
Read more about Microsoft Windows Kernel AuthzBasepCopyoutInternalSecurityAttributes Elevation of Privilege Vulnerability Exploit
The Windows NT operating system kernel executable (ntoskrnl.exe) present in Microsoft Windows is vulnerable to a race condition, which can result in arbitrary memory write. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges.

Pagination

  • Previous page ‹‹
  • Page 2
  • Next page ››
Subscribe to Local
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Research Article
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.