Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[dos] Microsoft Windows Kernel - 'win32k!NtGdiDoBanding' Stack Memory Disclosure
Microsoft Windows Kernel - 'win32k!NtGdiDoBanding' Stack Memory Disclosure
https://www.exploit-db.com/exploits/42749/?rss
[dos] Microsoft Windows Kernel - 'win32k!NtGdiEngCreatePalette' Stack Memory Disclosure
Microsoft Windows Kernel - 'win32k!NtGdiEngCreatePalette' Stack Memory Disclosure
https://www.exploit-db.com/exploits/42748/?rss
[dos] Microsoft Windows Kernel - 'win32k!NtGdiGetFontResourceInfoInternalW' Stack Memory Disclosure
Microsoft Windows Kernel - 'win32k!NtGdiGetFontResourceInfoInternalW' Stack Memory Disclosure
https://www.exploit-db.com/exploits/42747/?rss
[dos] Microsoft Windows Kernel win32k.sys TTF Font Processing - Out-of-Bounds Read with Malformed "glyf" Table (win32k!fsc_CalcGrayRow)
Microsoft Windows Kernel win32k.sys TTF Font Processing - Out-of-Bounds Read with Malformed "glyf" Table (win32k!fsc_CalcGrayRow)
https://www.exploit-db.com/exploits/42746/?rss
[webapps] Apache - HTTP OPTIONS Memory Leak
Apache - HTTP OPTIONS Memory Leak
https://www.exploit-db.com/exploits/42745/?rss
[dos] Microsoft Windows Kernel win32k.sys TTF Font Processing - Out-of-Bounds Reads/Writes with Malformed 'fpgm' table (win32k!bGeneratePath)
Microsoft Windows Kernel win32k.sys TTF Font Processing - Out-of-Bounds Reads/Writes with Malformed 'fpgm' table (win32k!bGeneratePath)
https://www.exploit-db.com/exploits/42744/?rss
[webapps] Tecnovision DLX Spot - Arbitrary File Upload
Tecnovision DLX Spot - Arbitrary File Upload
https://www.exploit-db.com/exploits/42755/?rss
[webapps] Tecnovision DLX Spot - Authentication Bypass
Tecnovision DLX Spot - Authentication Bypass
https://www.exploit-db.com/exploits/42754/?rss
[remote] Tecnovision DLX Spot - SSH Backdoor
Tecnovision DLX Spot - SSH Backdoor
https://www.exploit-db.com/exploits/42753/?rss
[webapps] iTech Gigs Script 1.20 - 'cat' Parameter SQL Injection
iTech Gigs Script 1.20 - 'cat' Parameter SQL Injection
https://www.exploit-db.com/exploits/42752/?rss
[webapps] Foodspotting Clone 1.0 - SQL Injection
Foodspotting Clone 1.0 - SQL Injection
https://www.exploit-db.com/exploits/42751/?rss
[papers] Windows and Linux Privilege Escalation
Windows and Linux Privilege Escalation
http://www.exploit-db.com/docs/42757.pdf?rss
[remote] HPE < 7.2 - Java Deserialization
HPE < 7.2 - Java Deserialization
https://www.exploit-db.com/exploits/42756/?rss
[dos] Microsoft Edge 38.14393.1066.0 - 'COptionsCollectionCacheItem::GetAt' Out-of-Bounds Read
Microsoft Edge 38.14393.1066.0 - 'COptionsCollectionCacheItem::GetAt' Out-of-Bounds Read
https://www.exploit-db.com/exploits/42759/?rss
[dos] Microsoft Edge 38.14393.1066.0 - Memory Corruption with Partial Page Loading
Microsoft Edge 38.14393.1066.0 - Memory Corruption with Partial Page Loading
https://www.exploit-db.com/exploits/42758/?rss
[papers] Kernel Driver mmap Handler Exploitation
Kernel Driver mmap Handler Exploitation
http://www.exploit-db.com/docs/42760.pdf?rss
[webapps] PHPMyFAQ 2.9.8 - Cross-Site Scripting
PHPMyFAQ 2.9.8 - Cross-Site Scripting
https://www.exploit-db.com/exploits/42761/?rss
[dos] Microsoft Edge Chakra - 'JavascriptFunction::ReparseAsmJsModule' Incorrectly Re-parses
Microsoft Edge Chakra - 'JavascriptFunction::ReparseAsmJsModule' Incorrectly Re-parses
https://www.exploit-db.com/exploits/42766/?rss
[dos] Microsoft Edge Chakra - 'Parser::ParseCatch' does not Handle 'eval'
Microsoft Edge Chakra - 'Parser::ParseCatch' does not Handle 'eval'
https://www.exploit-db.com/exploits/42765/?rss
[dos] Microsoft Edge Chakra - Deferred Parsing Makes Wrong Scopes
Microsoft Edge Chakra - Deferred Parsing Makes Wrong Scopes
https://www.exploit-db.com/exploits/42764/?rss