[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » type: local
Tulpa
Fortitude HTTP 1.0.4.0 - Unquoted Service Path Privilege Escalation
local
windows
Tulpa
Abyss Web Server X1 2.11.1 - Unquoted Service Path Privilege Escalation
local
windows
OJ Reeves
Street Fighter 5 - 'Capcom.sys' Kernel Execution (Metasploit)
local
windows_x86-64
Dawid Golunski
Apache Tomcat 8/7/6 (Debian-Based Distros) - Local Privilege Escalation
local
linux
CVE-2016-1240
zaeek
Microsoft Windows Firewall Control - Unquoted Service Path Privilege Escalation
local
windows
Tulpa
Netgear Genie 2.4.32 - Unquoted Service Path Privilege Escalation
local
windows
R-73eN
KeepNote 0.7.8 - Command Execution
local
multiple
s0nk3y
Glassfish Server - Unquoted Service Path Privilege Escalation
local
windows
Metasploit
Linux Kernel 4.6.3 (x86) - 'Netfilter' Local Privilege Escalation (Metasploit)
local
linux_x86
CVE-2016-4997;DSA-3607-1
Google Security Research
Microsoft Windows - RegLoadAppKey Hive Enumeration Privilege Escalation (MS16-111)
local
windows
CVE-2016-3373;MS16-111
Google Security Research
Microsoft Windows 8.1 Update 2 / 10 10586 (x86/x64) - NtLoadKeyEx User Hive Attachment Point Privilege Escalation (MS16-111)
local
windows
CVE-2016-3371;MS16-111
Tulpa
Macro Expert 4.0 - Multiple Privilege Escalations
local
windows
Tulpa
Iperius Remote 1.7.0 - Unquoted Service Path Privilege Escalation
local
windows
ReWolf
MSI - 'NTIOLib.sys' / 'WinIO.sys' Local Privilege Escalation
local
windows
zaeek
Elantech-Smart Pad 11.9.0.0 - Unquoted Service Path Privilege Escalation
local
windows
Tulpa
NetDrive 2.6.12 - Unquoted Service Path Privilege Escalation
local
windows
«
...
100
101
102
103
104
105
106
107
108
109
110
...
»
page: 105/313 [exploits: 4997]