[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » author: g_
Joseph McDonagh
Windows/x86 - Download File (http://192.168.10.10/evil.exe _c:\evil.exe_) Via bitsadmin + Execute Shellcode (210 Bytes)
windows_x86
210.0
Google Security Research
Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion
dos
multiple
CVE-2019-11707
Simon Gurney
SuperDoctor5 - 'NRPE' Remote Code Execution
remote
multiple
Google Security Research
Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation
dos
windows
CVE-2019-0943
Google Security Research
Microsoft Windows - 'CmpAddRemoveContainerToCLFSLog' Arbitrary File/Directory Creation
dos
windows
CVE-2019-0959
Google Security Research
Linux - Use-After-Free via race Between modify_ldt() and #BR Exception
dos
linux
Guy Levin
Serv-U FTP Server < 15.1.7 - Local Privilege Escalation (1)
local
linux
CVE-2019-12181
Goutham Madhwaraj
Sahi pro 8.x - Cross-Site Scripting
webapps
multiple
CVE-2018-20472
Goutham Madhwaraj
Sahi pro 8.x - SQL Injection
webapps
multiple
CVE-2018-20469
Goutham Madhwaraj
Sahi pro 7.x/8.x - Directory Traversal
webapps
multiple
CVE-2018-20470
X41 D-Sec GmbH
Thunderbird ESR < 60.7.XXX - 'icalrecur_add_bydayrules' Stack-Based Buffer Overflow
dos
multiple
CVE-2019-11705
X41 D-Sec GmbH
Thunderbird ESR < 60.7.XXX - 'parser_get_next_char' Heap-Based Buffer Overflow
dos
multiple
CVE-2019-11703
X41 D-Sec GmbH
Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Overflow
dos
multiple
CVE-2019-11704
X41 D-Sec GmbH
Thunderbird ESR < 60.7.XXX - Type Confusion
dos
multiple
CVE-2019-11706
Gushmazuko
Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (PowerShell)
local
windows
Google Security Research
Google Chrome 73.0.3683.103 - 'WasmMemoryObject::Grow' Use-After-Free
dos
multiple
«
...
48
49
50
51
52
53
54
55
56
57
58
...
»
page: 53/548 [exploits: 8754]