Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Microsoft Endpoint Configuration Manager Connected Cache Local Privilege Escalation Exploit
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Read more about Oracle Access Manager ADF Faces Deserialization Vulnerability Remote Code Execution Exploit
This module exploits a server side request forgery present in getKeyInfoData function of oracle.security.xmlsec.keys.RetrievalMethod. Chained with a deserialization vulnerability present in the ADF Faces framework to deploy an agent in the system running Oracle Access Manager.
Read more about Microsoft Windows Networks File System 4.1 Remote DoS
Microsoft Windows could allow a remote attacker to execute arbitrary code or BSOD the system, caused by a design flaw in the Network File System component.
Read more about RealVNC Server Privilege Escalation Exploit
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Read more about Atlassian Confluence xworks OGNL Injection Vulnerability Exploit
This module exploits a OGNL injection vulnerability present in the xwork jar file of Atlassian Confluence. The deployed agent will run with the confluence user privileges in linux and with NT AUTHORITY\\NETWORK SERVICE in windows.
Read more about Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Exploit
This module exploits a vulnerability in Microsoft MSDT, which can be leveraged to execute arbitrary code on vulnerable machines by convincing an unsuspecting user to open a malicious document.
Read more about Windows Ancillary Function Driver for WinSock DoS
This module uses ioctls to produce an integer overflow and generate a Denial of Service
Read more about Microsoft Windows Point-to-Point Tunneling Protocol DoS
This module crashes the target machine producing a blue screen by sending a malformed PPTP packet.
Read more about Oracle Access Manager OpenssoEngineController Deserialization Vulnerability Remote Code Execution Exploit
This module exploits a Deserialization vulnerability present in the OpenssoEngineController component of Oracle Access Manager.
Read more about Microsoft Windows Print Spooler Elevation of Privilege Vulnerability Exploit (CVE-2022-21999)
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system.

Pagination

  • Previous page ‹‹
  • Page 16
  • Next page ››
Subscribe to Windows
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.