Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about HP Hardware Diagnostics EtdSupp Local Privilege Escalation Exploit
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Read more about Oracle Weblogic Server T3 ForeignOpaqueReference JNDI Injection Remote Code Execution Exploit
A vulnerability in Oracle WebLogic Server (component: Core) which can be exploited through the T3/IIOP protocol network, which transfers information between WebLogic servers and other Java programs. This vulnerability found in Oracle WebLogic Server can lead to remote code execution.
Read more about PaperCut MF Authentication Bypass Remote Code Execution Exploit
A vulnerability in the SetupCompleted class allows to unauthenticated remote code attackers to execute system commands. The deployed agent will run with SYSTEM privileges.
Read more about PaperCut MF Authentication Bypass Remote Code Execution Webapp Exploit
A vulnerability in the SetupCompleted class allows to unauthenticated remote code attackers to execute system commands. The deployed agent will run with SYSTEM privileges.
Read more about Zoho ManageEngine ADManager Plus ChangePasswordAction OS Command Injection Exploit
This module exploits an OS command injection vulnerability present in the ChangePasswordAction function.
Read more about Zoho ManageEngine ADManager Plus ChangePasswordAction OS Command Injection Webapp Exploit
This module exploits an OS command injection vulnerability present in the ChangePasswordAction function.
Read more about Microsoft Message Queuing DoS
This module crashes the MSMQ service by sending a malformed UserMessage packet which triggers an integer overflow vulnerability.
Read more about Microsoft Windows Common Log File System Driver Elevation of Privilege Vulnerability Exploit
The Common Log File System Driver (clfs.sys) present in Microsoft Windows is vulnerable to a memory corruption vulnerability. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by creating a specially crafted BLF file.
Read more about Veeam Backup and Replication Backup Service Remote Code Execution Exploit
This module exploits the unauthenticated endpoint of the Backup Service in Veeam Backup and Replication. The deployed agent will run with the privileges of the "SQL Server" process (NT AUTHORITY\\SYSTEM).
Read more about Microsoft Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Exploit
The Ancillary Function Driver (AFD.sys) present in Microsoft Windows is vulnerable to an arbitrary memory overwrite. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by sending a specially crafted IOCTL to the vulnerable driver.

Pagination

  • Previous page ‹‹
  • Page 13
  • Next page ››
Subscribe to Windows
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.