Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Raspberry Pi Default Credentials Exploit
This module exploits a default credentials on Raspberry pi because it has default username and password.
Read more about Microsoft Windows NTFS Elevation of Privilege Vulnerability Exploit
This module exploits a heap overflow in ntfs.sys by calling to the "NtQueryEaFile" function with crafted parameters.
Read more about Grafana getPluginAssets Path Traversal Local File Disclosure Exploit
This module exploits a path traversal vulnerability present in the getPluginAssets function of Grafana which allows an attacker to download system files through specially crafted HTTP resource requests.
Read more about VMware vRealize Operations Manager Log4shell Remote Code Execution Vulnerability Exploit
This module exploits a JNDI injection present in the log4j library. The deployed agent will run with the admin user account privileges.
Read more about VMware vCenter Server Log4shell Remote Code Execution Vulnerability Exploit
This module exploits a JNDI injection present in the log4j library. The deployed agent will run with the root user account privileges on Linux systems and with SYSTEM privileges on Windows systems.
Read more about Microsoft Exchange TypedBinaryFormatter Deserialization Remote Code Execution Vulnerability Exploit
This module exploits a deserialization vulnerability present in the TypedBinaryFormatter class. The deployed agent will run with the SYSTEM privileges.
Read more about Atlassian Confluence Webwork OGNL Injection Vulnerability Exploit
This module exploits a OGNL injection vulnerability present in the WebWork component of Atlassian Confluence. The deployed agent will run with tomcat privileges.
Read more about Canon Printer TR150 Driver Local Privilege Escalation Exploit
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Read more about VMware vCenter Server Virtual SAN Health Check plug-in Remote OS Command Injection Exploit
This module exploits a Java unsafe reflection and a Server Side Request Forgery vulnerabilities present in ProxygenController class via POST requests to the /ui/h5-vsan/rest/proxy/service endpoint. The deployed agent will run with the vsphere-ui user account privileges.
Read more about Microsoft Exchange MeetingPollHandler Deserialization Remote Code Execution Vulnerability Exploit
This module exploits a deserialization vulnerability present in MeetingPollHandler handler when using a ProposeOptionsMeetingPollParameters type. The deployed agent will run with the SYSTEM privileges.

Pagination

  • Previous page ‹‹
  • Page 27
  • Next page ››
Subscribe to Impact
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.