[remote] DOUBLEPULSAR - Payload Execution and Neutralization (Metasploit)
DOUBLEPULSAR - Payload Execution and Neutralization (Metasploit)
https://www.exploit-db.com/exploits/47456
DOUBLEPULSAR - Payload Execution and Neutralization (Metasploit)
https://www.exploit-db.com/exploits/47456
Exploit Database
DOUBLEPULSAR - Payload Execution and Neutralization (Metasploit)
DOUBLEPULSAR - Payload Execution and Neutralization (Metasploit). CVE-2017-0148CVE-2017-0147CVE-2017-0146CVE-2017-0145CVE-2017-0144CVE-2017-0143 . remote exploit for Windows platform
[webapps] Detrix EDMS 1.2.3.1505 - SQL Injection
Detrix EDMS 1.2.3.1505 - SQL Injection
https://www.exploit-db.com/exploits/47455
Detrix EDMS 1.2.3.1505 - SQL Injection
https://www.exploit-db.com/exploits/47455
Exploit Database
Detrix EDMS 1.2.3.1505 - SQL Injection
Detrix EDMS 1.2.3.1505 - SQL Injection.. webapps exploit for PHP platform
[local] Counter-Strike Global Offensive 1.37.1.1 - 'vphysics.dll' Denial of Service (PoC)
Counter-Strike Global Offensive 1.37.1.1 - 'vphysics.dll' Denial of Service (PoC)
https://www.exploit-db.com/exploits/47454
Counter-Strike Global Offensive 1.37.1.1 - 'vphysics.dll' Denial of Service (PoC)
https://www.exploit-db.com/exploits/47454
Exploit Database
Counter-Strike Global Offensive 1.37.1.1 - 'vphysics.dll' Denial of Service (PoC)
Counter-Strike Global Offensive 1.37.1.1 - 'vphysics.dll' Denial of Service (PoC). CVE-2019-15943 . dos exploit for Windows platform
[local] Android - Binder Driver Use-After-Free
Android - Binder Driver Use-After-Free
https://www.exploit-db.com/exploits/47463
Android - Binder Driver Use-After-Free
https://www.exploit-db.com/exploits/47463
Exploit Database
Android - Binder Driver Use-After-Free
Android - Binder Driver Use-After-Free. CVE-2019-2215 . local exploit for Android platform
[remote] freeFTP 1.0.8 - Remote Buffer Overflow
freeFTP 1.0.8 - Remote Buffer Overflow
https://www.exploit-db.com/exploits/47472
freeFTP 1.0.8 - Remote Buffer Overflow
https://www.exploit-db.com/exploits/47472
Exploit Database
freeFTP 1.0.8 - 'PASS' Remote Buffer Overflow
freeFTP 1.0.8 - 'PASS' Remote Buffer Overflow.. remote exploit for Windows platform
[local] CheckPoint Endpoint Security Client/ZoneAlarm 15.4.062.17802 - Privilege Escalation
CheckPoint Endpoint Security Client/ZoneAlarm 15.4.062.17802 - Privilege Escalation
https://www.exploit-db.com/exploits/47471
CheckPoint Endpoint Security Client/ZoneAlarm 15.4.062.17802 - Privilege Escalation
https://www.exploit-db.com/exploits/47471
Exploit Database
CheckPoint Endpoint Security Client/ZoneAlarm 15.4.062.17802 - Privilege Escalation
CheckPoint Endpoint Security Client/ZoneAlarm 15.4.062.17802 - Privilege Escalation. CVE-2019-8452 . local exploit for Windows platform
[webapps] IBM Bigfix Platform 9.5.9.62 - Arbitrary File Upload
IBM Bigfix Platform 9.5.9.62 - Arbitrary File Upload
https://www.exploit-db.com/exploits/47470
IBM Bigfix Platform 9.5.9.62 - Arbitrary File Upload
https://www.exploit-db.com/exploits/47470
Exploit Database
IBM Bigfix Platform 9.5.9.62 - Arbitrary File Upload
IBM Bigfix Platform 9.5.9.62 - Arbitrary File Upload. CVE-2019-4013 . webapps exploit for Java platform
[webapps] Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting
Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting
https://www.exploit-db.com/exploits/47469
Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting
https://www.exploit-db.com/exploits/47469
Exploit Database
Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting
Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting. CVE-2019-17225 . webapps exploit for PHP platform
[local] ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (DEP)
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (DEP)
https://www.exploit-db.com/exploits/47468
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (DEP)
https://www.exploit-db.com/exploits/47468
Exploit Database
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (DEP)
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (DEP).. local exploit for Windows_x86-64 platform
[webapps] Zabbix 4.2 - Authentication Bypass
Zabbix 4.2 - Authentication Bypass
https://www.exploit-db.com/exploits/47467
Zabbix 4.2 - Authentication Bypass
https://www.exploit-db.com/exploits/47467
Exploit Database
Zabbix 4.2 - Authentication Bypass
Zabbix 4.2 - Authentication Bypass.. webapps exploit for PHP platform
[local] logrotten 3.15.1 - Privilege Escalation
logrotten 3.15.1 - Privilege Escalation
https://www.exploit-db.com/exploits/47466
logrotten 3.15.1 - Privilege Escalation
https://www.exploit-db.com/exploits/47466
Exploit Database
logrotten 3.15.1 - Privilege Escalation
logrotten 3.15.1 - Privilege Escalation.. local exploit for Linux platform
[webapps] Joomla 3.4.6 - 'configuration.php' Remote Code Execution
Joomla 3.4.6 - 'configuration.php' Remote Code Execution
https://www.exploit-db.com/exploits/47465
Joomla 3.4.6 - 'configuration.php' Remote Code Execution
https://www.exploit-db.com/exploits/47465
[dos] Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47489
Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47489
Exploit Database
Microsoft Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
Microsoft Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File. CVE-2019-1347 . dos exploit for Windows platform
[dos] Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47488
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47488
Exploit Database
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File. CVE-2019-1346 . dos exploit for Windows platform
[dos] Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47487
Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47487
Exploit Database
Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File. CVE-2019-1345 . dos exploit for Windows platform
[dos] Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47486
Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47486
Exploit Database
Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File. CVE-2019-1344 . dos exploit for Windows platform
[dos] Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47485
Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
https://www.exploit-db.com/exploits/47485
Exploit Database
Microsoft Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
Microsoft Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File. CVE-2019-1343 . dos exploit for Windows platform
[dos] Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
https://www.exploit-db.com/exploits/47484
Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
https://www.exploit-db.com/exploits/47484
Exploit Database
Microsoft Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
Microsoft Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter. CVE-2019-1364 . dos exploit for Windows platform
[webapps] TP-Link TL-WR1043ND 2 - Authentication Bypass
TP-Link TL-WR1043ND 2 - Authentication Bypass
https://www.exploit-db.com/exploits/47483
TP-Link TL-WR1043ND 2 - Authentication Bypass
https://www.exploit-db.com/exploits/47483
Exploit Database
TP-Link TL-WR1043ND 2 - Authentication Bypass
TP-Link TL-WR1043ND 2 - Authentication Bypass. CVE-2019-6971 . webapps exploit for Hardware platform
[local] ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
https://www.exploit-db.com/exploits/47482
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
https://www.exploit-db.com/exploits/47482
Exploit Database
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass).. local exploit for Linux platform