Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2020-10-16Microsoft Windows Uninitialized Variable Local Privilege EscalationPublished
2020-09-29Microsoft Windows Update Orchestrator Unchecked ScheduleWork CallPublished
2020-07-04Microsoft Windows Mshta.exe HTA File / XML External Entity InjectionPublished
2020-05-17Microsoft Windows Task Scheduler Security Feature BypassPublished
2020-04-06Microsoft Windows net use Logon Command Insufficient Password PromptPublished
2020-03-15Microsoft Windows SMB 3.1.1 Remote Code ExecutionPublished
2020-03-09Microsoft Windows WizardOpium Local Privilege EscalationPublished
2020-02-18Microsoft Windows 10 MSI Privilege EscalationPublished
2020-02-01Microsoft Windows 10 DLL Search PathPublished
2020-01-30Microsoft Windows 10 Theme API ThemePack File ParsingPublished
2020-01-21Microsoft Windows 10 19H1 1901 x64 ws2ifsl.sys Use After Free Local Privilege Escalation kASLR kCPublished
2020-01-13Microsoft Windows 10 build 1809 Local Privilege Escalation UAC BypassPublished
2020-01-04Microsoft Windows VCF Card Mailto Link Denial Of ServicePublished
2020-01-01Microsoft Windows .Group File / URL Field Code ExecutionPublished
2019-12-24Microsoft Windows 10 BasicRender.sys Denial Of ServicePublished
2019-12-03Microsoft Windows Media Center XXE MotW Bypass Anniversary EditionPublished
2019-10-29Microsoft Windows Server 2012 Group Policy Remote Code ExecutionPublished
2019-10-29Microsoft Windows Server 2012 Group Policy Security Feature BypassPublished
2019-10-05Microsoft Windows Silent Process Exit PersistencePublished
2019-09-25Microsoft Windows BlueKeep RDP Remote Windows Kernel Use After Free MetasploitPublished
2019-09-08Microsoft Windows 10 UAC Protection Bypass Via Windows StorePublished
2019-09-06Microsoft Windows NTFS Privileged File Access EnumerationPublished
2019-08-09Microsoft Windows 7 build 7601 x86 Local Privilege EscalationPublished
2019-08-09Microsoft Windows PowerShell Unsanitized Filename Command ExecutionPublished
2019-07-26Microsoft Windows Task Scheduler Local Privilege EscalationPublished
2019-07-18Microsoft Windows Remote Desktop BlueKeep Denial of Service MetasploitPublished
2019-07-16Microsoft Windows RDP BlueKeep Denial Of ServicePublished
2019-07-16Microsoft Windows RDP BlueKeep Denial Of ServicePublished
2019-06-19Microsoft Windows UAC Protection BypassPublished
2019-06-19Microsoft Windows UAC Protection BypassPublished
2019-04-12Microsoft Windows Contact File Format Arbitary Code ExecutionPublished
2019-03-17Microsoft Windows MSHTML Engine Edit Remote Code ExecutionPublished
2019-03-13Microsoft Windows .Reg File / Dialog Box Message SpoofingPublished
2019-01-23Microsoft Windows .contact File HTML Injection Mailto: Link Remote Code Execution 0day ZPublished
2019-01-17Microsoft Windows .contact Arbitrary Code ExecutionPublished
2018-12-19Microsoft Windows jscript!JsArrayFunctionHeapSort Out-Of-Bounds WritePublished
2018-11-21Microsoft Windows DfMarshal Unsafe Unmarshaling Privilege EscalationPublished
2018-11-09Microsoft Windows 10 Build 17134 Local Privilege EscalationPublished
2018-10-23Microsoft Windows 10 UAC Bypass By computerDefaultPublished
2018-10-20Microsoft Windows SetImeInfoEx Win32k NULL Pointer DereferencePublished




Copyright © 2020 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy