Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Audio Converter PLS File Buffer Overflow Exploit
The vulnerability is caused due to a boundary error in Audio Converter when handling .PLS files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .PLS file.
Read more about Oracle GlassFish Server Administration Console Authentication Bypass Remote Code Execution Exploit
The Administration Console of Oracle GlassFish Server is prone to an authentication bypass vulnerability, which can be achieved by performing HTTP TRACE requests. A remote unauthenticated attacker can exploit this in order to execute arbitrary code on the vulnerable server.
Read more about Iconics Genesis SCADA HMI Genbroker Server Exploit
The Genesis GenBroker service is listening port 38080 and is affected by integer overflow vulnerabilities while handling crafted packets in opcode 0x4b0.
Read more about Word List Builder DIC File Buffer Overflow Exploit
This module exploits a stack-based buffer overflow in Word Builder which is triggered by a malformed DIC file.
Read more about Safari Webkit SVG Memory Corruption Exploit
Webkit, as used in Apple Safari before 5.06 is prone to a memory corruption vulnerability caused by a web site with a crafted SVG graphic. This allows remote attackers to execute arbitrary code.
Read more about Symantec AppStream LaunchObj ActiveX Exploit Update
This module exploits an arbitrary file download and execute vulnerability in the LaunchObj ActiveX Control included in Symantec AppStream Client.

This update fixes an issue in the agent connector.

Read more about HP Operations Manager Server Backdoor Account Exploit Update
This module exploits a remote code execution vulnerability in HP Operations Manager by using an undocumented user account to upload an arbitrary file.

This update fixes an issue in the agent injector.



Read more about Lotus Notes LZH Attachment Exploit
This module exploits a buffer overflow vulnerability in Lotus Notes when parsing a malformed, specially crafted LZH file received as an email attachment.
Read more about Blue Coat Authentication and Authorization Agent Buffer Overflow Exploit
Blue Coat BCAAA is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks. This exploit bypasses DEP protection by using ROP techniques.
Read more about FreeAmp FAT File Handling Buffer Overflow Exploit
This module exploits a vulnerability in FreeAmp. The buffer overflow is triggered when a specially crafted theme file is opened.

Pagination

  • Previous page ‹‹
  • Page 127
  • Next page ››
Subscribe to Windows
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Research Article
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.