[] NeoSense
search results for » type:
Google Security Research macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
local macos
Google Security Research Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback
dos windows CVE-2019-1429
ZwX LiteManager 4.5.0 - Insecure File Permissions
local windows
ZwX ProShow Producer 9.0.3797 - ('ScsiAccess') Unquoted Service Path
local windows
Amal E Thamban Network Management Card 6.2.0 - Host Header Injection
webapps hardware
Mike Gualtieri GNU Mailutils 3.7 - Privilege Escalation
local linux CVE-2019-18862
Milad Khoshdel TestLink 1.9.19 - Persistent Cross-Site Scripting
webapps hardware
Metasploit Xorg X11 Server - Local Privilege Escalation (Metasploit)
local unix CVE-2018-14665
Metasploit Xorg X11 Server - Local Privilege Escalation (Metasploit)
local unix CVE-2018-14665
Metasploit Pulse Secure VPN - Arbitrary Command Execution (Metasploit)
remote multiple CVE-2019-11539
Metasploit Bludit - Directory Traversal Image File Upload (Metasploit)
remote php CVE-2019-16113
Metasploit FreeSWITCH - Event Socket Command Execution (Metasploit)
remote multiple
Metasploit FusionPBX - Operator Panel exec.php Command Execution (Metasploit)
remote multiple CVE-2019-11409
Metasploit Microsoft Windows - Escalate UAC Protection Bypass (Via Shell Open Registry Key) (Metasploit)
local windows
Metasploit Microsoft Windows - Escalate UAC Protection Bypass (Via Shell Open Registry Key) (Metasploit)
local windows
Metasploit Microsoft Windows - Escalate UAC Protection Bypass (Via dot net profiler) (Metasploit)
local windows
page: 279/2935 [exploits: 46950]