Exploit for CVE-2014-1812
The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability."
Published: 2014-05-14
CVSS: 9.0
CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Download Exploit for CVE-2014-1812 here:
Use Tor Browser to access .onion links.
Check our team here:
https://tatramed.sk/exploit-600-cve-2025-10164/
https://tatramed.sk/exploit-1051-cve-2024-22259/
https://tatramed.sk/exploit-679-cve-2023-46233/

ADRESA
Líščie údolie 9
841 04 Bratislava
Slovenská republika
KONTAKTY
tel. č.:+421 2 6020 2301
tel. č.: +421 2 6020 2351
e-mail: info@tatramed.sk
FAKTURAČNÉ ÚDAJE
IČO: 47025328
DIČ: 2023706751
IČ DPH: SK2023706751
Copyright 2019-2024 TatraMed Software s.r.o. © All Rights Reserved | Made by MERINEO