Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2017-10-19MS Windows Game Definition File Editor v6.3.9600 / XML External EntityPublished
2017-10-18Windows Kernel Pool Ntfs!LfsRestartLogFile Memory DisclosurePublished
2017-10-18Windows Kernel Pool nt!RtlpCopyLegacyContextX86 Memory DisclosurePublished
2017-10-13Windows Escalate UAC Protection Bypass In Memory Injection Abusing WinSXSPublished
2017-10-11PostgreSQL 10 Installer For Windows DLL HijackingPublished
2017-10-07Microsoft Windows 10 x64 RS2 win32kfull!bFill Pool OverflowPublished
2017-09-19Microsoft Windows Kernel win32k.sys TTF Font Buffer OverflowPublished
2017-09-19Microsoft Windows Kernel win32k!NtQueryCompositionSurfaceBinding Stack Memory DisclosurePublished
2017-09-19Microsoft Windows Kernel win32k!NtGdiDoBanding Stack Memory DisclosurePublished
2017-09-19Microsoft Windows Kernel win32k!NtGdiGetFontResourceInfoInternalW Stack Memory DisclosurePublished
2017-09-18Microsoft Windows Kernel win32k!NtGdiGetGlyphOutline Pool Memory DisclosurePublished
2017-08-22Windows Escalate UAC Protection Bypass Via COM Handler HijackPublished
2017-08-09Microsoft Windows 8.1 x64 RGNOBJ Integer Overflow MS16-098Published
2017-08-08Microsoft Windows 7 SP1 x86 GDI Palette Objects Local Privilege Escalation MS17-017Published
2017-08-04VirtualBox 5.1.22 Windows Process DLL Signature Bypass Privilege EscalationPublished
2017-08-04VirtualBox 5.1.22 Windows Process DLL UNC Path Signature Bypass Privilege EscalationPublished
2017-08-03Windows 10 SMBLoris attack proof of the conceptPublished
2017-07-27Microsoft Windows - LNK Shortcut File Code ExecutionPublished
2017-07-14Microsoft Windows COM Session Moniker Privilege EscalationPublished
2017-07-12Microsoft Windows EternalBlue SMB Remote Code Execution .py ExploitPublished
2017-06-22Microsoft Windows 'IOCTL 0x390400, operation code 0x00020000' Kernel KsecDD Pool Memory DiPublished
2017-06-22Microsoft Windows 'IOCTL_MOUNTMGR_QUERY_POINTS' Kernel Mountmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'nt!NtQueryVolumeInformationFile FileFsVolumeInformation' Kernel Pool Published
2017-06-22Microsoft Windows - 'nt!NtNotifyChangeDirectoryFile' Kernel Pool Memory DisclosurePublished
2017-06-22Microsoft Windows - '0x224000 IOCTL WmiQueryAllData' Kernel WMIDataDevice Pool Memory DiPublished
2017-06-22Microsoft Windows 'IOCTL_VOLUME_GET_VOLUME_DISK_EXTENTS' volmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'nt!KiDispatchException' Kernel Stack Memory Disclosure in Exception HanPublished
2017-06-22Microsoft Windows 'win32k!NtGdiEnumFonts' Kernel Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'IOCTL_DISK_GET_DRIVE_GEOMETRY_EX' Kernel partmgr Pool Memory DisclosurePublished
2017-06-22Microsoft Windows 'IOCTL_DISK_GET_DRIVE_LAYOUT_EX' Kernel partmgr Pool Memory DisclosurePublished
2017-06-21Microsoft Windows Kernel DeviceApi Stack Memory DisclosurePublished
2017-06-08Windows UAC Protection Bypass Via FodHelper Registry KeyPublished
2017-05-28Veritas Backup Exec Remote Agent For Windows Use-After-FreePublished
2017-05-20Microsoft Windows 8/2012 R2 x64 EternalBlue Remote Code ExecutionPublished
2017-05-20Microsoft Windows 7/2008 R2 x64 EternalBlue Remote Code ExecutionPublished
2017-05-18Microsoft Windows COM Aggregate IRemUnknown2 Type Confusion Privilege EscalationPublished
2017-05-17MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption MetasploitPublished
2017-05-16Windows 7 Uninitialized Memory in the Default dacl Descriptor of System Processes TokenPublished
2017-05-16Windows 10 Kernel nt!NtTraceControl EtwpSetProviderTraits Pool Memory DisclosurePublished




Copyright © 2017 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.