Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2020-06-21Windows x32-x64 MSFVenom TCP/80-4444 Remote Management ExploitPublished
2020-06-17Pulse Secure Client For Windows Local Privilege EscalationPublished
2020-05-24Druva inSync Windows Client 6.6.3 Local Privilege EscalationPublished
2020-05-17Microsoft Windows Task Scheduler Security Feature BypassPublished
2020-04-30Druva inSync Windows Client 6.5.2 Privilege EscalationPublished
2020-04-09NetABuse - Windows Insufficient Authentication Logic ScannerPublished
2020-04-06Microsoft Windows net use Logon Command Insufficient Password PromptPublished
2020-03-15Microsoft Windows SMB 3.1.1 Remote Code ExecutionPublished
2020-03-09Microsoft Windows WizardOpium Local Privilege EscalationPublished
2020-03-08Deep Instinct Windows Agent 1.2.29.0 DeepMgmtService Unquoted Service PathPublished
2020-02-29Windows Kernel Elevation of Privilege VulnerabilityPublished
2020-02-18Microsoft Windows 10 MSI Privilege EscalationPublished
2020-02-01Microsoft Windows 10 DLL Search PathPublished
2020-01-30Microsoft Windows 10 Theme API ThemePack File ParsingPublished
2020-01-21Microsoft Windows 10 19H1 1901 x64 ws2ifsl.sys Use After Free Local Privilege Escalation kASLR kCPublished
2020-01-13Microsoft Windows 10 build 1809 Local Privilege Escalation UAC BypassPublished
2020-01-04Microsoft Windows VCF Card Mailto Link Denial Of ServicePublished
2020-01-01Microsoft Windows .Group File / URL Field Code ExecutionPublished
2019-12-24Microsoft Windows 10 BasicRender.sys Denial Of ServicePublished
2019-12-09Mozilla FireFox Windows 10 x64 Full Chain Client Side AttackPublished
2019-12-06Windows 10 1903: Microsoft details search fix as new update bug hitsPublished
2019-12-03Microsoft Windows Media Center XXE MotW Bypass Anniversary EditionPublished
2019-11-27FortiOS 6.0.6 / FortiClientWindows 6.0.6 / FortiClientMac 6.2.1 XOR EncryptionPublished
2019-11-20Windows Escalate UAC Protection Bypass Via Dot Net ProfilerPublished
2019-10-29Microsoft Windows Server 2012 Group Policy Remote Code ExecutionPublished
2019-10-29Microsoft Windows Server 2012 Group Policy Security Feature BypassPublished
2019-10-25Windows Kernel Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE FilePublished
2019-10-05Microsoft Windows Silent Process Exit PersistencePublished
2019-09-25Microsoft Windows BlueKeep RDP Remote Windows Kernel Use After Free MetasploitPublished
2019-09-24BlueKeep RDP Remote Windows Kernel Use-After-FreePublished
2019-09-09NtFileSins v2.1 / Windows NTFS Privileged File Access Enumeration ToolPublished
2019-09-08Microsoft Windows 10 UAC Protection Bypass Via Windows StorePublished
2019-09-08NtFileSins / Windows NTFS Privileged File Access Enumeration ToolPublished
2019-09-06Microsoft Windows NTFS Privileged File Access EnumerationPublished
2019-09-06Windows 10 UAC Protection Bypass Via Windows Store WSReset.exe And RegistryPublished
2019-08-30GGPowerShell / Windows PowerShell Unsanitized RCE File ToolPublished
2019-08-19Adobe Acrobat Reader DC for Windows Heap-Based Memory CorruptionPublished
2019-08-14Steam Windows Client Local Privilege EscalationPublished
2019-08-09Microsoft Windows 7 build 7601 x86 Local Privilege EscalationPublished
2019-08-09Microsoft Windows PowerShell Unsanitized Filename Command ExecutionPublished




Copyright © 2020 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy