[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
Google Security Research
Microsoft Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
dos
windows
CVE-2019-1346
Google Security Research
Microsoft Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
dos
windows
CVE-2019-1345
Google Security Research
Microsoft Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
dos
windows
CVE-2019-1344
Google Security Research
Microsoft Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
dos
windows
CVE-2019-1343
Google Security Research
Microsoft Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
dos
windows
CVE-2019-1364
Uriel Kosayev
TP-Link TL-WR1043ND 2 - Authentication Bypass
webapps
hardware
80.0
CVE-2019-6971
max7253
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (DEP Bypass) (Metasploit)
local
linux
max7253
ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (DEP Bypass) (Metasploit)
local
linux
VL43CK
Linux/x86 - Add Root User (vl43ck/test) To /etc/passwd Shellcode (59 bytes)
linux_x86
Borja Merino
SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery
webapps
hardware
80.0
CVE-2019-13529
Google Security Research
XNU - Remote Double-Free via Data Race in IPComp Input Path
dos
macos
CVE-2019-8717
Alessandro Magnosi
Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)
dos
windows
Alessandro Magnosi
Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)
dos
windows
Alessandro Magnosi
DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass)
local
windows
Alessandro Magnosi
DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass)
local
windows
Alessandro Magnosi
DeviceViewer 3.12.0.1 - Arbitrary Password Change
local
windows
«
...
291
292
293
294
295
296
297
298
299
300
301
...
»
page: 296/3001 [exploits: 48015]