Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2017-11-22Microsoft Windows NTFS File System Metadata DisclosuresPublished
2017-11-22Microsoft Windows 10 CiSetFileCache TOCTOU Security Feature BypassPublished
2017-11-15PSFTPd Windows FTP Server 10.0.4 Build 729 Log Injection / Use-After-FreePublished
2017-11-10Datto Windows Agent Remote Code ExecutionPublished
2017-11-09Microsoft Windows LNK File Code ExecutionPublished
2017-10-30Windows Attachment Manager Incorrect High Risk JAR HandlingPublished
2017-10-30Microsoft Windows 10 Creators Update 32-bit Ring-0 Code ExecutionPublished
2017-10-26Windows NTLM Auth Hash Disclosure / Denial Of ServicePublished
2017-10-19MS Windows Game Definition File Editor v6.3.9600 / XML External EntityPublished
2017-10-18Windows Kernel Pool Ntfs!LfsRestartLogFile Memory DisclosurePublished
2017-10-18Windows Kernel Pool nt!RtlpCopyLegacyContextX86 Memory DisclosurePublished
2017-10-13Windows Escalate UAC Protection Bypass In Memory Injection Abusing WinSXSPublished
2017-10-11PostgreSQL 10 Installer For Windows DLL HijackingPublished
2017-10-07Microsoft Windows 10 x64 RS2 win32kfull!bFill Pool OverflowPublished
2017-09-19Microsoft Windows Kernel win32k.sys TTF Font Buffer OverflowPublished
2017-09-19Microsoft Windows Kernel win32k!NtQueryCompositionSurfaceBinding Stack Memory DisclosurePublished
2017-09-19Microsoft Windows Kernel win32k!NtGdiDoBanding Stack Memory DisclosurePublished
2017-09-19Microsoft Windows Kernel win32k!NtGdiGetFontResourceInfoInternalW Stack Memory DisclosurePublished
2017-09-18Microsoft Windows Kernel win32k!NtGdiGetGlyphOutline Pool Memory DisclosurePublished
2017-08-22Windows Escalate UAC Protection Bypass Via COM Handler HijackPublished
2017-08-09Microsoft Windows 8.1 x64 RGNOBJ Integer Overflow MS16-098Published
2017-08-08Microsoft Windows 7 SP1 x86 GDI Palette Objects Local Privilege Escalation MS17-017Published
2017-08-04VirtualBox 5.1.22 Windows Process DLL Signature Bypass Privilege EscalationPublished
2017-08-04VirtualBox 5.1.22 Windows Process DLL UNC Path Signature Bypass Privilege EscalationPublished
2017-08-03Windows 10 SMBLoris attack proof of the conceptPublished
2017-07-27Microsoft Windows - LNK Shortcut File Code ExecutionPublished
2017-07-14Microsoft Windows COM Session Moniker Privilege EscalationPublished
2017-07-12Microsoft Windows EternalBlue SMB Remote Code Execution .py ExploitPublished
2017-06-22Microsoft Windows 'IOCTL 0x390400, operation code 0x00020000' Kernel KsecDD Pool Memory DiPublished
2017-06-22Microsoft Windows 'IOCTL_MOUNTMGR_QUERY_POINTS' Kernel Mountmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'nt!NtQueryVolumeInformationFile FileFsVolumeInformation' Kernel Pool Published
2017-06-22Microsoft Windows - 'nt!NtNotifyChangeDirectoryFile' Kernel Pool Memory DisclosurePublished
2017-06-22Microsoft Windows - '0x224000 IOCTL WmiQueryAllData' Kernel WMIDataDevice Pool Memory DiPublished
2017-06-22Microsoft Windows 'IOCTL_VOLUME_GET_VOLUME_DISK_EXTENTS' volmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'nt!KiDispatchException' Kernel Stack Memory Disclosure in Exception HanPublished
2017-06-22Microsoft Windows 'win32k!NtGdiEnumFonts' Kernel Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'IOCTL_DISK_GET_DRIVE_GEOMETRY_EX' Kernel partmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'IOCTL_DISK_GET_DRIVE_LAYOUT_EX' Kernel partmgr Pool Memory DisclosurePublished
2017-06-21Microsoft Windows Kernel DeviceApi Stack Memory DisclosurePublished




Copyright © 2017 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.