Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Microsoft Windows SMBv3 CoronaBlue Vulnerability DoS
This module crashes the target machine producing a blue screen by sending a specially crafted SMB packet
Read more about Integard Pro NoJs Parameter Buffer Overflow Exploit
Integard Pro is prone to a buffer-overflow vulnerability when handling a crafted POST packet.
Read more about Windows Error Reporting Manager Arbitrary File Move Elevation of Privilege Exploit (CVE-2019-1315)
This can be exploited to execute arbitrary code with System privileges. It is working until KB4497727 and KB4495666 for Windows 10 x64 v1903
Read more about Viper RGB Driver Kernel Buffer Overflow Local Privilege Escalation Exploit
The vulnerability was a buffer overflow in Viper RGB driver.
Read more about MSI Afterburner RTCore64 Privilege Escalation Exploit
The vulnerability allows read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.
Read more about Microsoft Windows Ws2ifsl UaF Local Privilege Escalation Exploit
An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'
Read more about Microsoft Windows Win32k xxxMNFindWindowFromPoint Vulnerability Exploit
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory.
Read more about Microsoft Windows SMBv3 SMBGhost Remote Code Execution Exploit
The srv2.sys driver exposes functionality that allows remote users to write arbitrary memory via specially crafted packet and gain the ability to execute code on the target server.
Read more about Microsoft Windows SMBv3 SMBGhost Elevation of Privilege Vulnerability Exploit
The srv2.sys driver exposes functionality that allows low-privileged users to write arbitrary memory via specially crafted packet and elevate system privileges.
Read more about Microsoft Windows Service Tracing Privilege Escalation Exploit (CVE-2020-0668)
An arbitrary privileged file move operation exists in Microsoft Windows Service Tracing. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Pagination

  • Previous page ‹‹
  • Page 25
  • Next page ››
Subscribe to Windows
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.