Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2017-06-22Microsoft Windows 'IOCTL 0x390400, operation code 0x00020000' Kernel KsecDD Pool Memory DiPublished
2017-06-22Microsoft Windows 'IOCTL_MOUNTMGR_QUERY_POINTS' Kernel Mountmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'nt!NtQueryVolumeInformationFile FileFsVolumeInformation' Kernel Pool Published
2017-06-22Microsoft Windows - 'nt!NtNotifyChangeDirectoryFile' Kernel Pool Memory DisclosurePublished
2017-06-22Microsoft Windows - '0x224000 IOCTL WmiQueryAllData' Kernel WMIDataDevice Pool Memory DiPublished
2017-06-22Microsoft Windows 'IOCTL_VOLUME_GET_VOLUME_DISK_EXTENTS' volmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'nt!KiDispatchException' Kernel Stack Memory Disclosure in Exception HanPublished
2017-06-22Microsoft Windows 'win32k!NtGdiEnumFonts' Kernel Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'IOCTL_DISK_GET_DRIVE_GEOMETRY_EX' Kernel partmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'IOCTL_DISK_GET_DRIVE_LAYOUT_EX' Kernel partmgr Pool Memory DisclosurePublished
2017-06-21Microsoft Windows Kernel DeviceApi Stack Memory DisclosurePublished
2017-06-08Windows UAC Protection Bypass Via FodHelper Registry KeyPublished
2017-05-28Veritas Backup Exec Remote Agent For Windows Use-After-FreePublished
2017-05-20Microsoft Windows 8/2012 R2 x64 EternalBlue Remote Code ExecutionPublished
2017-05-20Microsoft Windows 7/2008 R2 x64 EternalBlue Remote Code ExecutionPublished
2017-05-18Microsoft Windows COM Aggregate IRemUnknown2 Type Confusion Privilege EscalationPublished
2017-05-17MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption MetasploitPublished
2017-05-16Windows 7 Uninitialized Memory in the Default dacl Descriptor of System Processes TokenPublished
2017-05-16Windows 10 Kernel nt!NtTraceControl EtwpSetProviderTraits Pool Memory DisclosurePublished
2017-05-16Windows 7 Kernel win32k!xxxClientLpkDrawTextEx Stack Memory DisclosurePublished
2017-05-16Windows 7 Pool-Based Out-of-Bounds Reads Due to bind afd.sys and tcpip.sysPublished
2017-04-26Microsoft Windows 2003 SP2 'ERRATICGOPHER' SMB Remote Code ExecutionPublished
2017-04-25Microsoft Windows Dolby Audio X2 Service Privilege EscalationPublished
2017-04-25Windows 7/ALL/8/8.1 x86/x64 BlueScreen ShellCode Exploit *youtubePublished
2017-04-21Microsoft Windows IFEO Winlogin SYSTEM Backdooring ExploitPublished
2017-04-21Microsoft Windows 10 10586 IEETWCollector Privilege EscalationPublished
2017-04-21Microsoft Windows - ManagementObject Arbitrary .NET Serialization RCEPublished
2017-04-19Microsoft Windows taskschd.msc Privilege EscalationPublished
2017-04-18Microsoft Windows MS17-010 SMB Remote Code ExecutionPublished
2017-04-13Windows 10 'win32kfull!SfnINLPUAHDRAWMENUITEM' Stack Memory DisclosurePublished
2017-03-16Windows DVD Maker XML External Entity File DisclosurePublished
2017-03-16Microsoft Windows 'LoadUvsTable' Heap-based Buffer OverflowPublished
2017-03-01Synchronet BBS 3.16c for Windows Multiple vulnerabilitiesPublished
2017-02-15ShadeYouVPN.com Client For Windows 2.0.1.11 Privilege EscalationPublished
2017-02-07IVPN Client for Windows 2.6.6120.33863 Privilege EscalationPublished
2017-02-03Microsoft Windows 10 DoS SMBv3 Tree Connect PoCPublished
2017-02-01Viscosity For Windows 1.6.7 Privilege EscalationPublished
2017-01-12Microsoft Windows 8.1 x64 RGNOBJ Integer OverflowPublished
2017-01-07Microsoft Edge Windows 10 - Info Leak / Type Confusion Remote Code ExecutionPublished
2016-12-07Microsoft Windows 10 x86/x64 WLAN AutoConfig Named Pipe Proof Of ConceptPublished




Copyright © 2017 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.