Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about TFM MMPlayer M3U Buffer Overflow Exploit
The vulnerability is caused due to a boundary error when handling .M3U files. This can be exploited to cause a stack-based buffer overflow via a specially crafted file of said extension.
Read more about Omron CX-One CXP File Buffer Overflow Exploit
This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Read more about Microsoft Windows Shell Remote Code Execution Vulnerability Exploit (CVE-2018-8495)
Microsoft Windows Shell does not properly sanitize special characters in a URI, allowing to open a dangerous files. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Read more about Microsoft Windows Shell Remote Code Execution Vulnerability Exploit (CVE-2018-8414)
Microsoft Windows Shell does not properly validate file paths, allowing the execution of ".SettingContent-ms" files from outside the "ImmersiveControlPanel" folder. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Read more about Horner Automation Cscape CSP File Buffer Overflow Exploit
This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Read more about Fuji Electric V-Server VPR File Parsing Buffer Overflow Exploit (CVE-2018-10637)
Fuji Electric V-Server is prone to a buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data via a crafted .VPR document. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Read more about Free WMA MP3 Converter Local Buffer Overflow Exploit
The vulnerability is caused due to a boundary error when handling .WAV files. This can be exploited to cause a stack-based buffer overflow via a specially crafted file of said extension.
Read more about Free MP3 CD Ripper Buffer Overflow SEH Exploit
The vulnerability is caused due to a boundary error when handling .WMA/.MP3/.WAV files. This can be exploited to cause a stack-based buffer overflow via a specially crafted file of said extension.
Read more about Foxit Reader UAF Remote Execution Exploit
The vulnerability is caused due to a boundary error when handling .PDF files. This can be exploited to cause a stack-based buffer overflow via a specially crafted file of said extension.
Read more about Delta Industrial Automation CNCSoft ScreenEditor DPB File wKPFString Exploit
Delta Automation CNCSoft Screen Editor is prone to a buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data via a crafted .DPB document. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.

Pagination

  • Previous page ‹‹
  • Page 34
  • Next page ››
Subscribe to Windows
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.