vendor:
win32_exec
by:
Anonymous
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: win32_exec
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2020
win32_exec
This exploit is a buffer overflow vulnerability in the win32_exec module of Metasploit. It allows an attacker to execute arbitrary code on the target system by overflowing a buffer with malicious code. The exploit uses an encoder called PexFnstenvMov to encode the malicious code and then injects it into the vulnerable application.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all applications are up to date and patched with the latest security updates.