Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2017-11-30Microsoft Windows 10 Creators Update 1703 WARBIRD NtQuerySystemInformation Kernel Local Privilege EsPublished
2017-11-25Microsoft Windows 10 nt!NtQueryDirectoryFile luafv!LuafvCopyDirectoryEntry Pool Memory DisclosurePublished
2017-11-22Microsoft Windows NTFS File System Metadata DisclosuresPublished
2017-11-22Microsoft Windows 10 CiSetFileCache TOCTOU Security Feature BypassPublished
2017-11-09Microsoft Windows LNK File Code ExecutionPublished
2017-10-30Microsoft Windows 10 Creators Update 32-bit Ring-0 Code ExecutionPublished
2017-10-07Microsoft Windows 10 x64 RS2 win32kfull!bFill Pool OverflowPublished
2017-09-19Microsoft Windows Kernel win32k.sys TTF Font Buffer OverflowPublished
2017-09-19Microsoft Windows Kernel win32k!NtQueryCompositionSurfaceBinding Stack Memory DisclosurePublished
2017-09-19Microsoft Windows Kernel win32k!NtGdiDoBanding Stack Memory DisclosurePublished
2017-09-19Microsoft Windows Kernel win32k!NtGdiGetFontResourceInfoInternalW Stack Memory DisclosurePublished
2017-09-18Microsoft Windows Kernel win32k!NtGdiGetGlyphOutline Pool Memory DisclosurePublished
2017-08-09Microsoft Windows 8.1 x64 RGNOBJ Integer Overflow MS16-098Published
2017-08-08Microsoft Windows 7 SP1 x86 GDI Palette Objects Local Privilege Escalation MS17-017Published
2017-07-27Microsoft Windows - LNK Shortcut File Code ExecutionPublished
2017-07-14Microsoft Windows COM Session Moniker Privilege EscalationPublished
2017-07-12Microsoft Windows EternalBlue SMB Remote Code Execution .py ExploitPublished
2017-06-22Microsoft Windows 'IOCTL 0x390400, operation code 0x00020000' Kernel KsecDD Pool Memory DiPublished
2017-06-22Microsoft Windows 'IOCTL_MOUNTMGR_QUERY_POINTS' Kernel Mountmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'nt!NtQueryVolumeInformationFile FileFsVolumeInformation' Kernel Pool Published
2017-06-22Microsoft Windows - 'nt!NtNotifyChangeDirectoryFile' Kernel Pool Memory DisclosurePublished
2017-06-22Microsoft Windows - '0x224000 IOCTL WmiQueryAllData' Kernel WMIDataDevice Pool Memory DiPublished
2017-06-22Microsoft Windows 'IOCTL_VOLUME_GET_VOLUME_DISK_EXTENTS' volmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'nt!KiDispatchException' Kernel Stack Memory Disclosure in Exception HanPublished
2017-06-22Microsoft Windows 'win32k!NtGdiEnumFonts' Kernel Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'IOCTL_DISK_GET_DRIVE_GEOMETRY_EX' Kernel partmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'IOCTL_DISK_GET_DRIVE_LAYOUT_EX' Kernel partmgr Pool Memory DisclosurePublished
2017-06-21Microsoft Windows Kernel DeviceApi Stack Memory DisclosurePublished
2017-05-20Microsoft Windows 8/2012 R2 x64 EternalBlue Remote Code ExecutionPublished
2017-05-20Microsoft Windows 7/2008 R2 x64 EternalBlue Remote Code ExecutionPublished
2017-05-18Microsoft Windows COM Aggregate IRemUnknown2 Type Confusion Privilege EscalationPublished
2017-04-26Microsoft Windows 2003 SP2 'ERRATICGOPHER' SMB Remote Code ExecutionPublished
2017-04-25Microsoft Windows Dolby Audio X2 Service Privilege EscalationPublished
2017-04-21Microsoft Windows IFEO Winlogin SYSTEM Backdooring ExploitPublished
2017-04-21Microsoft Windows 10 10586 IEETWCollector Privilege EscalationPublished
2017-04-21Microsoft Windows - ManagementObject Arbitrary .NET Serialization RCEPublished
2017-04-19Microsoft Windows taskschd.msc Privilege EscalationPublished
2017-04-18Microsoft Windows MS17-010 SMB Remote Code ExecutionPublished
2017-03-16Microsoft Windows 'LoadUvsTable' Heap-based Buffer OverflowPublished
2017-02-03Microsoft Windows 10 DoS SMBv3 Tree Connect PoCPublished




Copyright © 2017 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.