Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about InduSoft Web Studio SCADA REVERB1 DLL Hijacking Exploit
InduSoft Web Studio SCADA is prone to a vulnerability that may allow execution of module REVERB1 if this dll is located in the same folder than .APP file.
Read more about Microsoft Excel XLB File Processing Buffer Overflow Exploit (MS11-021)
The vulnerability exists within the application's parsing of a particular record within a Microsoft Excel Compound Document. When specifying a particular value, the application will fail to initialize a variable that is used as the length of a memcpy operation.
Read more about Microsoft Windows Font Library File Buffer Overrun Vulnerability Exploit (MS11-077)
When a crafted ".fon" file is loaded by Windows Kernel this produces a kernel heap overflow.

This module exploits this vulnerability filling the kernel memory via heap spraying and building a fake chunk header.
Read more about Microsoft Windows Meeting Space DLL Hijacking Exploit (MS11-085)
Windows Meeting Space is prone to a vulnerability that may allow the execution of any library file named wab32res.dll, if this dll is located in the same folder as a .WCINV file.
Read more about Oracle Java Rhino Script Engine Remote Code Execution Exploit
The Rhino Script Engine of Oracle Java fails to properly check for permissions on JavaScript error objects. This flaw allows an unprivileged applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user.

Read more about MetaServer RT Packet Processing Remote DoS
The vulnerability is caused due to an error when processing certain packets and can be exploited to cause a crash via a specially crafted packet sent to TCP port 2194.
Read more about Microsoft Windows AFD AfdJoinLeaf Privilege Escalation Exploit Update (MS11-080)
The Ancillary Function Driver (AFD.sys) present in Microsoft Windows is vulnerable to an arbitrary pointer overwrite. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by sending a specially crafted IOCTL to the vulnerable driver.



This update adds support for Windows 2003.
Read more about Oracle AutoVue Electro-Mechanical Professional dwmapi DLL Hijacking Exploit
Oracle AutoVue Electro-Mechanical Professional is prone to a vulnerability that may allow the execution of any library file named dwmapi.dll, if this dll is located in the same folder than a .DWG file.
Read more about EViews Enterprise Edition dwmapi DLL Hijacking Exploit
EViews Enterprise Edition is prone to a vulnerability that may allow the execution of any library file named dwmapi.dll, if this dll is located in the same folder than a .PRG file.
Read more about NJStar Communicator MiniSMTP Server Buffer Overflow Exploit
Stack Overflow in the MiniSmtp Server component of the NJStar Communicator.

Pagination

  • Previous page ‹‹
  • Page 119
  • Next page ››
Subscribe to Windows
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Research Article
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.