[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » type: local
bcoles
Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalation
local
linux
CVE-2019-13272
AMRI Amine
Comtrend-AR-5310 - Restricted Shell Escape
local
linux
dominikczarnotatob
Docker - Container Escape
local
linux
Google Security Research
Microsoft Windows 10 1903/1809 - RPCSS Activation Kernel Security Callback Privilege Escalation
local
windows
CVE-2019-1089
Metasploit
Microsoft Windows - NtUserSetWindowFNID Win32k User Callback Privilege Escalation (Metasploit)
local
windows
CVE-2018-8453
Metasploit
Microsoft Windows - NtUserSetWindowFNID Win32k User Callback Privilege Escalation (Metasploit)
local
windows
CVE-2018-8453
Google Security Research
Linux - Broken Permission and Object Lifetime Handling for PTRACE_TRACEME
local
linux
CVE-2019-13272
Metasploit
Microsoft Windows 10 < build 17763 - AppXSvc Hard Link Privilege Escalation (Metasploit)
local
windows
CVE-2019-0841
Metasploit
Microsoft Windows 10 < build 17763 - AppXSvc Hard Link Privilege Escalation (Metasploit)
local
windows
CVE-2019-0841
Xavi Beltran
DameWare Remote Support 12.0.0.509 - 'Host' Buffer Overflow (SEH)
local
windows
CVE-2018-12897
Xavi Beltran
DameWare Remote Support 12.0.0.509 - 'Host' Buffer Overflow (SEH)
local
windows
CVE-2018-12897
blackleitus
R 3.4.4 (Windows 10 x64) - Buffer Overflow SEH (DEP/ASLR Bypass)
local
windows_x86-64
blackleitus
R 3.4.4 (Windows 10 x64) - Buffer Overflow SEH (DEP/ASLR Bypass)
local
windows_x86-64
Andrey Stoykov
Streamripper 2.6 - 'Song Pattern' Buffer Overflow
local
windows
Andrey Stoykov
Streamripper 2.6 - 'Song Pattern' Buffer Overflow
local
windows
Google Security Research
Microsoft Windows 10.0.17134.648 - HTTP -> SMB NTLM Reflection Leads to Privilege Elevation
local
windows
CVE-2019-1019
«
...
44
45
46
47
48
49
50
51
52
53
54
...
»
page: 49/313 [exploits: 4997]