[dos] Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47489
Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47489
Exploit Database
Microsoft Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
Microsoft Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File. CVE-2019-1347 . dos exploit for Windows platform
[dos] Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47488
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47488
Exploit Database
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File. CVE-2019-1346 . dos exploit for Windows platform
[dos] Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47487
Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47487
Exploit Database
Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File. CVE-2019-1345 . dos exploit for Windows platform
[dos] Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47486
Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47486
Exploit Database
Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File. CVE-2019-1344 . dos exploit for Windows platform
[dos] Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47485
Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47485
Exploit Database
Microsoft Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
Microsoft Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File. CVE-2019-1343 . dos exploit for Windows platform
[dos] Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
https://www.exploit-db.com/exploits/47484
Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
https://www.exploit-db.com/exploits/47484
Exploit Database
Microsoft Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
Microsoft Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter. CVE-2019-1364 . dos exploit for Windows platform
[webapps] TP-Link TL-WR1043ND 2 - Authentication Bypass
TP-Link TL-WR1043ND 2 - Authentication Bypass
https://www.exploit-db.com/exploits/47483
TP-Link TL-WR1043ND 2 - Authentication Bypass
https://www.exploit-db.com/exploits/47483
Exploit Database
TP-Link TL-WR1043ND 2 - Authentication Bypass
TP-Link TL-WR1043ND 2 - Authentication Bypass. CVE-2019-6971 . webapps exploit for Hardware platform
[local] ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
https://www.exploit-db.com/exploits/47482
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
https://www.exploit-db.com/exploits/47482
Exploit Database
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass).. local exploit for Linux platform
[webapps] SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery
SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47480
SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/47480
Exploit Database
SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery
SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery. CVE-2019-13529 . webapps exploit for Hardware platform
[dos] XNU - Remote Double-Free via Data Race in IPComp Input Path
XNU - Remote Double-Free via Data Race in IPComp Input Path
https://www.exploit-db.com/exploits/47479
XNU - Remote Double-Free via Data Race in IPComp Input Path
https://www.exploit-db.com/exploits/47479
Exploit Database
XNU - Remote Double-Free via Data Race in IPComp Input Path
XNU - Remote Double-Free via Data Race in IPComp Input Path. CVE-2019-8717 . dos exploit for macOS platform
[dos] Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)
Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)
https://www.exploit-db.com/exploits/47478
Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)
https://www.exploit-db.com/exploits/47478
Exploit Database
Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)
Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC).. dos exploit for Windows platform
[local] DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass)
DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass)
https://www.exploit-db.com/exploits/47477
DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass)
https://www.exploit-db.com/exploits/47477
Exploit Database
DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass)
DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass).. local exploit for Windows platform
[webapps] vBulletin 5.0 < 5.5.4 - 'updateAvatar' Authenticated Remote Code Execution
vBulletin 5.0 < 5.5.4 - 'updateAvatar' Authenticated Remote Code Execution
https://www.exploit-db.com/exploits/47475
vBulletin 5.0 < 5.5.4 - 'updateAvatar' Authenticated Remote Code Execution
https://www.exploit-db.com/exploits/47475
Exploit Database
vBulletin 5.0 < 5.5.4 - 'updateAvatar' Authenticated Remote Code Execution
vBulletin 5.0 < 5.5.4 - 'updateAvatar' Authenticated Remote Code Execution. CVE-2019-17132 . webapps exploit for PHP platform
[webapps] Zabbix 4.4 - Authentication Bypass
Zabbix 4.4 - Authentication Bypass
https://www.exploit-db.com/exploits/47474
Zabbix 4.4 - Authentication Bypass
https://www.exploit-db.com/exploits/47474
Exploit Database
Zabbix 4.4 - Authentication Bypass
Zabbix 4.4 - Authentication Bypass.. webapps exploit for PHP platform
[webapps] WordPress Arforms 3.7.1 - Directory Traversal
WordPress Arforms 3.7.1 - Directory Traversal
https://www.exploit-db.com/exploits/47492
WordPress Arforms 3.7.1 - Directory Traversal
https://www.exploit-db.com/exploits/47492
Exploit Database
WordPress Plugin Arforms 3.7.1 - Directory Traversal
WordPress Plugin Arforms 3.7.1 - Directory Traversal.. webapps exploit for PHP platform
[webapps] Intelbras Router WRN150 1.0.18 - Persistent Cross-Site Scripting
Intelbras Router WRN150 1.0.18 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47491
Intelbras Router WRN150 1.0.18 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/47491
Exploit Database
Intelbras Router WRN150 1.0.18 - Persistent Cross-Site Scripting
Intelbras Router WRN150 1.0.18 - Persistent Cross-Site Scripting.. webapps exploit for Hardware platform
[local] National Instruments Circuit Design Suite 14.0 - Local Privilege Escalation
National Instruments Circuit Design Suite 14.0 - Local Privilege Escalation
https://www.exploit-db.com/exploits/47490
National Instruments Circuit Design Suite 14.0 - Local Privilege Escalation
https://www.exploit-db.com/exploits/47490
Exploit Database
National Instruments Circuit Design Suite 14.0 - Local Privilege Escalation
National Instruments Circuit Design Suite 14.0 - Local Privilege Escalation.. local exploit for Windows platform
[webapps] ClonOs WEB UI 19.09 - Improper Access Control
ClonOs WEB UI 19.09 - Improper Access Control
https://www.exploit-db.com/exploits/47544
ClonOs WEB UI 19.09 - Improper Access Control
https://www.exploit-db.com/exploits/47544
Exploit Database
ClonOs WEB UI 19.09 - Improper Access Control
ClonOs WEB UI 19.09 - Improper Access Control. CVE-2019-18418 . webapps exploit for PHP platform
[local] Linux Polkit - pkexec helper PTRACE_TRACEME local root (Metasploit)
Linux Polkit - pkexec helper PTRACE_TRACEME local root (Metasploit)
https://www.exploit-db.com/exploits/47543
Linux Polkit - pkexec helper PTRACE_TRACEME local root (Metasploit)
https://www.exploit-db.com/exploits/47543
Exploit Database
Linux Polkit - pkexec helper PTRACE_TRACEME local root (Metasploit)
Linux Polkit - pkexec helper PTRACE_TRACEME local root (Metasploit). CVE-2019-13272 . local exploit for Linux platform
[webapps] AUO SunVeillance Monitoring System 1.1.9e - 'MailAdd' SQL Injection
AUO SunVeillance Monitoring System 1.1.9e - 'MailAdd' SQL Injection
https://www.exploit-db.com/exploits/47542
AUO SunVeillance Monitoring System 1.1.9e - 'MailAdd' SQL Injection
https://www.exploit-db.com/exploits/47542
Exploit Database
AUO SunVeillance Monitoring System 1.1.9e - 'MailAdd' SQL Injection
AUO SunVeillance Monitoring System 1.1.9e - 'MailAdd' SQL Injection.. webapps exploit for Hardware platform