[local] Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
https://www.exploit-db.com/exploits/46715
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
https://www.exploit-db.com/exploits/46715
Exploit Database
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation. CVE-2019-0796 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
https://www.exploit-db.com/exploits/46714
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
https://www.exploit-db.com/exploits/46714
Exploit Database
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation. CVE-2019-0731 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
https://www.exploit-db.com/exploits/46713
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
https://www.exploit-db.com/exploits/46713
Exploit Database
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation. CVE-2019-0730 . local exploit for Windows platform
[local] Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
https://www.exploit-db.com/exploits/46712
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
https://www.exploit-db.com/exploits/46712
Exploit Database
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation. CVE-2019-0735 . local exploit for Windows platform
[dos] AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46711
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46711
Exploit Database
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC).. dos exploit for Windows platform
[webapps] Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
https://www.exploit-db.com/exploits/46710
Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
https://www.exploit-db.com/exploits/46710
Exploit Database
Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion. CVE-2019-10945 . webapps exploit for PHP platform
[dos] PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46709
PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46709
Exploit Database
PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC).. dos exploit for Windows platform
[dos] PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46708
PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46708
Exploit Database
PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC).. dos exploit for Windows platform
[local] Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
https://www.exploit-db.com/exploits/46707
Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
https://www.exploit-db.com/exploits/46707
Exploit Database
Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation. CVE-2018-19374 . local exploit for Windows platform
[webapps] Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
https://www.exploit-db.com/exploits/46706
Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
https://www.exploit-db.com/exploits/46706
Exploit Database
Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting. CVE-2019-9955 . webapps exploit for Hardware platform
[remote] Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46705
Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46705
Exploit Database
Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit). CVE-2019-1663 . remote exploit for Hardware platform
[shellcode] Linux/x86 - Cat File Encode to base64 and post via curl to Webserver Shellcode (125 bytes)
Linux/x86 - Cat File Encode to base64 and post via curl to Webserver Shellcode (125 bytes)
https://www.exploit-db.com/exploits/46704
Linux/x86 - Cat File Encode to base64 and post via curl to Webserver Shellcode (125 bytes)
https://www.exploit-db.com/exploits/46704
Exploit Database
Linux/x86 - Cat File Encode to base64 and post via curl to Webserver Shellcode (125 bytes)
Linux/x86 - Cat File Encode to base64 and post via curl to Webserver Shellcode (125 bytes).. shellcode exploit for Linux_x86 platform
[dos] UltraVNC Launcher 1.2.2.4 - 'Path' Denial of Service (PoC)
UltraVNC Launcher 1.2.2.4 - 'Path' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46703
UltraVNC Launcher 1.2.2.4 - 'Path' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46703
Exploit Database
UltraVNC Launcher 1.2.2.4 - 'Path' Denial of Service (PoC)
UltraVNC Launcher 1.2.2.4 - 'Path' Denial of Service (PoC).. dos exploit for Windows platform
[dos] UltraVNC Viewer 1.2.2.4 - 'VNC Server' Denial of Service (PoC)
UltraVNC Viewer 1.2.2.4 - 'VNC Server' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46702
UltraVNC Viewer 1.2.2.4 - 'VNC Server' Denial of Service (PoC)
https://www.exploit-db.com/exploits/46702
Exploit Database
UltraVNC Viewer 1.2.2.4 - 'VNC Server' Denial of Service (PoC)
UltraVNC Viewer 1.2.2.4 - 'VNC Server' Denial of Service (PoC).. dos exploit for Windows platform
[remote] MailCarrier 2.51 - POP3 'TOP' SEH Buffer Overflow
MailCarrier 2.51 - POP3 'TOP' SEH Buffer Overflow
https://www.exploit-db.com/exploits/46701
MailCarrier 2.51 - POP3 'TOP' SEH Buffer Overflow
https://www.exploit-db.com/exploits/46701
Exploit Database
MailCarrier 2.51 - POP3 'TOP' SEH Buffer Overflow
MailCarrier 2.51 - POP3 'TOP' SEH Buffer Overflow.. remote exploit for Windows platform
[remote] MailCarrier 2.51 - POP3 'LIST' SEH Buffer Overflow
MailCarrier 2.51 - POP3 'LIST' SEH Buffer Overflow
https://www.exploit-db.com/exploits/46700
MailCarrier 2.51 - POP3 'LIST' SEH Buffer Overflow
https://www.exploit-db.com/exploits/46700
Exploit Database
MailCarrier 2.51 - POP3 'LIST' SEH Buffer Overflow
MailCarrier 2.51 - POP3 'LIST' SEH Buffer Overflow.. remote exploit for Windows platform
[remote] MailCarrier 2.51 - POP3 'USER' Buffer Overflow
MailCarrier 2.51 - POP3 'USER' Buffer Overflow
https://www.exploit-db.com/exploits/46699
MailCarrier 2.51 - POP3 'USER' Buffer Overflow
https://www.exploit-db.com/exploits/46699
Exploit Database
MailCarrier 2.51 - POP3 'USER' Buffer Overflow
MailCarrier 2.51 - POP3 'USER' Buffer Overflow.. remote exploit for Windows platform
[remote] CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit)
CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46698
CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/46698
Exploit Database
CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit)
CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit). CVE-2019-11447 . remote exploit for PHP platform
[remote] RemoteMouse 3.008 - Arbitrary Remote Command Execution
RemoteMouse 3.008 - Arbitrary Remote Command Execution
https://www.exploit-db.com/exploits/46697
RemoteMouse 3.008 - Arbitrary Remote Command Execution
https://www.exploit-db.com/exploits/46697
Exploit Database
RemoteMouse 3.008 - Arbitrary Remote Command Execution
RemoteMouse 3.008 - Arbitrary Remote Command Execution.. remote exploit for Windows platform
[shellcode] Linux/x86 - MMX-PUNPCKLBW Encoder Shellcode (61 bytes)
Linux/x86 - MMX-PUNPCKLBW Encoder Shellcode (61 bytes)
https://www.exploit-db.com/exploits/46696
Linux/x86 - MMX-PUNPCKLBW Encoder Shellcode (61 bytes)
https://www.exploit-db.com/exploits/46696
Exploit Database
Linux/x86 - MMX-PUNPCKLBW Encoder Shellcode (61 bytes)
Linux/x86 - MMX-PUNPCKLBW Encoder Shellcode (61 bytes).. shellcode exploit for Generator platform