Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about AMD Radeon Graphics Elevation of Privilege Vulnerability Exploit
This module exploits an improper privilege management in the AMD Radeon Graphics driver that allows an authenticated attacker to craft an IOCTL request to gain I/O control over virtual addresses resulting in a potential arbitrary code execution.
Read more about Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability Exploit (CVE-2023-36802)
This module exploits an elevation of privilege vulnerability exists due to the MS KS Server kernel module allow accessing memory out of bounds. The vulnerability could allows an attacker to run code with elevated privileges.
Read more about Microsoft Streaming Service Elevation of Privilege Vulnerability Exploit
The mskssrv.sys driver before 10.0.22621.1 exposes functionality that allows low-privileged users to read and write arbitrary memory via specially crafted IOCTL requests and elevate system privileges.
Read more about Windows File History Service FHSVC Elevation of Privilege Exploit
The vulnerability exists due to application does not properly impose security restrictions in Windows File History Service, which leads to security restrictions bypass and privilege escalation and allows a local user to escalate privileges to NT AUTHORITY\SYSTEM.
Read more about Windows Error Reporting Local Privilege Escalation Exploit BOF
The vulnerability exists due to application does not properly impose security restrictions in Windows Error Reporting Service, which leads to security restrictions bypass and privilege escalation and allows a local user (non included in Administrator group) to escalate privileges to NT AUTHORITY\SYSTEM.
Read more about Linux Kernel OverlayFS Logic Upper Attributes Local Privilege Escalation Exploit
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
Read more about Microsoft Windows Win32k xxxEnableMenuItem Elevation of Privilege Exploit
An elevation of privilege vulnerability exists due to the Windows kernel improperly validating input passed from user mode to the kernel. The vulnerability could allow an attacker to run code with elevated privileges.
Read more about Wacom Drivers for Windows Local Privilege Escalation Exploit
The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Read more about Windows Common Log File System Driver Local Privilege Escalation Exploit (CVE-2023-28252)
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Read more about Linux Kernel OverlayFS Logic Upper Local Privilege Escalation Exploit
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system

Pagination

  • Previous page ‹‹
  • Page 4
  • Next page ››
Subscribe to Privilege Escalation
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Research Article
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.