Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about SaferVPN Local Privilege Escalation Exploit
This module exploits a vulnerability in SaferVPN loading a malicious OpenSSL engine.
Read more about Microsoft Windows WalletService Elevation of Privilege Vulnerability Exploit
An elevation of privilege vulnerability exists in the way the Windows WalletService handles objects in memory.
Read more about Microsoft Windows splwow64 Untrusted Pointer Dereference Privilege Escalation Exploit
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Read more about Microsoft Windows Print Spooler Service Arbitrary File Write Elevation of Privilege Vulnerability Exploit (CVE-2020-1337)
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system bypassing CVE-2020-1048.
Read more about Microsoft Windows Print Spooler Service Arbitrary File Write Elevation of Privilege Vulnerability Exploit
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system.
Read more about Microsoft Windows Print Spooler Elevation of Privilege Vulnerability Exploit
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system.
Read more about Microsoft Windows CloudExperienceHost Elevation of Privilege Vulnerability Exploit
An elevation of privilege vulnerability exists when Microsoft Windows CloudExperienceHost fails to check COM objects.
Read more about FreeBSD Sendmsg Compat32 Local Privilege Escalation Exploit
This module exploits a vulnerability in FreeBSD. The sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.
Read more about Cisco AnyConnect Posture Security Service Local Privilege Escalation Exploit
Multiple vulnerabilities in Cisco AnyConnect Posture for Windows could allow an authenticated local attacker, to execute arbitrary commands with SYSTEM user privileges.
Read more about Microsoft SharePoint Server WikiContentWebpart Web Part Remote OS Command Injection Exploit (CVE-2020-1181)
This module exploits a OS Command Injection via ASP.NET markup vulnerability present in the WikiContentWebpart Web Part of Microsoft SharePoint Server to deploy an agent. The deployed agent will run with the SharePoint Server service account privileges.

Pagination

  • Previous page ‹‹
  • Page 32
  • Next page ››
Subscribe to Impact
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.