Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about MAPLE Computer SNMP Administrator Exploit
Maple Computer SNMP Asministrator is prone to a buffer-overflow vulnerability when handling a crafted packet.
Read more about File Sharing Wizard POST Method Exploit
File Share Wizard is prone to a buffer-overflow vulnerability when handling a crafted POST packet.
Read more about AVEVA InduSoft Web Studio Remote Command Injection Exploit
AVEVA InduSoft Web Studio is prone to a remote vulnerability that allows attackers to execute commands under the context of the program user.
Read more about Advantech WebAccess SCADA GetUserPasswd BwPAlarm Buffer Overflow Exploit
The specific flaw exists within BwPAlarm.dll, which is accessed through the 70603 IOCTL in the webvrpcs process. The process does not properly validate the length of user-supplied data prior to copying it to a fixed-length buffer.
Read more about Adobe ColdFusion JNBridge Remote Code Execution Exploit
Adobe ColdFusion is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JNBridge protocol.
Read more about Windows Win32k Elevation Of Privilege Exploit (CVE-2019-0803)
This module exploits a win32k component vulnerability This can be exploited to execute arbitrary code with System privileges. It is working until KB4507004 update 2019/07/08 it is patched in KB4507449 Security Monthly Quality Rollup for Windows 7 x64-based Systems 2019/07/09
Read more about Viper RGB Driver Kernel Arbitrary Read Write Local Privilege Escalation Exploit
The vulnerability allows read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.
Read more about Microsoft Windows Win32k xxxMNOpenHierarchy Vulnerability Exploit
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory.
Read more about Microsoft Windows UPnP Device Host Local Privilege Escalation Exploit
Gets SYSTEM privileges exploiting two vulnerabilities (CVE-2019-1405 / CVE-2019-1322). The first one allows us to get NT AUTHORITY/SERVICE using a method of a COM Object from UPnP Device Host Service. Then, with NT AUTHORITY/SERVICE privileges, we elevate to NT AUTHORITY/SYSTEM with CVE-2019-1322.
Read more about Check Point Endpoint Security Initial Client Privilege Escalation Exploit
This module exploits a Check Point Endpoint Security Initial Client vulnerability that can execute arbitrary code with System privileges.

Pagination

  • Previous page ‹‹
  • Page 27
  • Next page ››
Subscribe to Windows
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.