Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Date Name Status
2024-02-18Microsoft Windows Defender / Trojan.Win32/Powessere.G Detection Mitigation Bypass Part 2.Published
2024-01-06Themebleed Windows 11 Themes Arbitrary Code ExecutionPublished
2023-12-07PHP8: php-curl from Curl-8.4.0 Windows11 Privilage-Escalation RCEPublished
2023-09-20Windows Common Log File System Driver clfs.sys Privilege EscalationPublished
2023-06-14Windows PowerShell PS1 Trojan File RCEPublished
2023-04-05Windows 11 10.0.22000 Backup service Privilege EscalationPublished
2023-02-27Microsoft Windows Contact File / Remote Code Execution Resurrected CVE-2022-44666Published
2023-02-22Microsoft Windows Contact File Remote Code ExecutionPublished
2022-09-11Windows Credential Guard Non-Constant Time Comparison Information DisclosurePublished
2022-08-15Windows sxs!CNodeFactory::XMLParser_Element_doc_assembly_assemblyIdentity Heap Buffer OverflowPublished
2022-08-14Windows sxssrv!BaseSrvActivationContextCacheDuplicateUnicodeString Heap Buffer OverflowPublished
2022-04-13Windows User Profile Service Privlege EscalationPublished
2021-09-19Microsoft Windows cmd.exe Stack Buffer OverflowPublished
2021-09-05Windows Defender Application Guard Denial Of ServicePublished
2021-05-18Microsoft Windows TokenMagic Privilege EscalationPublished
2021-05-13ScadaBR 1.0 / 1.1CE Windows Shell UploadPublished
2021-05-02Microsoft Windows UAC Privilege EscalationPublished
2021-04-27Windows 10 Wi-Fi Drivers For Intel Wireless Adapters 22.30.0 Privilege EscalationPublished
2021-03-17Windows Server 2012 SrClient DLL HijackingPublished
2021-03-16Microsoft Windows Containers DP API Cryptography FlawPublished
2021-03-10Microsoft Windows Containers Privilege EscalationPublished
2021-03-06Microsoft Windows RRAS Service MIBEntryGet OverflowPublished
2020-12-16Microsoft Windows DrawIconEx Local Privilege EscalationPublished
2020-11-14Deep Instinct Windows Agent DeepNetworkService Unquoted Service PathPublished
2020-11-11Microsoft Windows Local Spooler BypassPublished
2020-11-08NtFileSins v2.2 - Windows NTFS Privileged File Access Enumeration Tool Python v3Published
2020-10-16Microsoft Windows Uninitialized Variable Local Privilege EscalationPublished
2020-09-29Microsoft Windows Update Orchestrator Unchecked ScheduleWork CallPublished
2020-09-14Windows TCPIP Finger Command finger.exe / C2 Channel and Bypassing Security SoftwarePublished
2020-07-18Plex Unpickle Dict Windows Remote Code ExecutionPublished
2020-07-04Microsoft Windows Mshta.exe HTA File / XML External Entity InjectionPublished
2020-06-21Windows x32-x64 MSFVenom TCP/80-4444 Remote Management ExploitPublished
2020-06-17Pulse Secure Client For Windows Local Privilege EscalationPublished
2020-05-24Druva inSync Windows Client 6.6.3 Local Privilege EscalationPublished
2020-05-17Microsoft Windows Task Scheduler Security Feature BypassPublished
2020-04-30Druva inSync Windows Client 6.5.2 Privilege EscalationPublished
2020-04-09NetABuse - Windows Insufficient Authentication Logic ScannerPublished
2020-04-06Microsoft Windows net use Logon Command Insufficient Password PromptPublished
2020-03-15Microsoft Windows SMB 3.1.1 Remote Code ExecutionPublished

Copyright © 2024 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy