Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[dos] Linux Kernel < 4.5.1 - Off-By-One (PoC)
Linux Kernel < 4.5.1 - Off-By-One (PoC)
https://www.exploit-db.com/exploits/44301/?rss
[local] Linux Kernel < 4.4.0-21 (Ubuntu 16.04 x64) - 'netfilter target_offset' Local Privilege Escalation
Linux Kernel < 4.4.0-21 (Ubuntu 16.04 x64) - 'netfilter target_offset' Local Privilege Escalation
https://www.exploit-db.com/exploits/44300/?rss
[local] Linux Kernel < 3.5.0-23 (Ubuntu 12.04.2 x64) - 'SOCK_DIAG' SMEP Bypass Local Privilege Escalation
Linux Kernel < 3.5.0-23 (Ubuntu 12.04.2 x64) - 'SOCK_DIAG' SMEP Bypass Local Privilege Escalation
https://www.exploit-db.com/exploits/44299/?rss
[local] Linux Kernel < 4.4.0-116 (Ubuntu 16.04.4) - Local Privilege Escalation
Linux Kernel < 4.4.0-116 (Ubuntu 16.04.4) - Local Privilege Escalation
https://www.exploit-db.com/exploits/44298/?rss
[papers] Analyze & Attack SSH Protocol
Analyze & Attack SSH Protocol
http://www.exploit-db.com/docs/vietnamese/44296-analyze-&-attack-ssh-protocol.pdf?rss
[dos] Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' 64-bit Pool Memory Disclosure
Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' 64-bit Pool Memory Disclosure
https://www.exploit-db.com/exploits/44308/?rss
[local] Google Software Updater macOS - Unsafe use of Distributed Objects Privilege Escalation
Google Software Updater macOS - Unsafe use of Distributed Objects Privilege Escalation
https://www.exploit-db.com/exploits/44307/?rss
[local] Microsoft Windows - Desktop Bridge Virtual Registry Arbitrary File Read/Write Privilege Escalation
Microsoft Windows - Desktop Bridge Virtual Registry Arbitrary File Read/Write Privilege Escalation
https://www.exploit-db.com/exploits/44314/?rss
[local] Microsoft Windows - Desktop Bridge VFS Privilege Escalation
Microsoft Windows - Desktop Bridge VFS Privilege Escalation
https://www.exploit-db.com/exploits/44313/?rss
[dos] Internet Explorer - 'RegExp.lastMatch' Memory Disclosure
Internet Explorer - 'RegExp.lastMatch' Memory Disclosure
https://www.exploit-db.com/exploits/44312/?rss
[dos] Microsoft Windows Kernel - 'nt!NtWaitForDebugEvent' 64-bit Stack Memory Disclosure
Microsoft Windows Kernel - 'nt!NtWaitForDebugEvent' 64-bit Stack Memory Disclosure
https://www.exploit-db.com/exploits/44311/?rss
[dos] Microsoft Windows Kernel - 'nt!KiDispatchException' 64-bit Stack Memory Disclosure
Microsoft Windows Kernel - 'nt!KiDispatchException' 64-bit Stack Memory Disclosure
https://www.exploit-db.com/exploits/44310/?rss
[dos] Microsoft Windows Kernel - 'NtQueryInformationThread(ThreadBasicInformation)' 64-bit Stack Memory Disclosure
Microsoft Windows Kernel - 'NtQueryInformationThread(ThreadBasicInformation)' 64-bit Stack Memory Disclosure
https://www.exploit-db.com/exploits/44309/?rss
[dos] Kamailio 5.1.1 / 5.1.0 / 5.0.0 - Off-by-One Heap Overflow
Kamailio 5.1.1 / 5.1.0 / 5.0.0 - Off-by-One Heap Overflow
https://www.exploit-db.com/exploits/44316/?rss
[local] Microsoft Windows - Desktop Bridge Virtual Registry NtLoadKey Arbitrary File Read/Write Privilege Escalation
Microsoft Windows - Desktop Bridge Virtual Registry NtLoadKey Arbitrary File Read/Write Privilege Escalation
https://www.exploit-db.com/exploits/44315/?rss
[webapps] Intelbras Telefone IP TIP200 LITE - Local File Disclosure
Intelbras Telefone IP TIP200 LITE - Local File Disclosure
https://www.exploit-db.com/exploits/44317/?rss
[webapps] Vehicle Sales Management System - Multiple Vulnerabilities
Vehicle Sales Management System - Multiple Vulnerabilities
https://www.exploit-db.com/exploits/44318/?rss
[shellcode] Linux/x86 - execve(/bin/sh) Shellcode (18 bytes)
Linux/x86 - execve(/bin/sh) Shellcode (18 bytes)
https://www.exploit-db.com/exploits/44321/?rss
[papers] Web Application Security Testing
Web Application Security Testing
http://www.exploit-db.com/docs/english/44319-web-application-security-testing.pdf?rss
[webapps] Cisco node-jos < 0.11.0 - Re-sign Tokens
Cisco node-jos < 0.11.0 - Re-sign Tokens
https://www.exploit-db.com/exploits/44324/?rss