[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: windows_x86-64
SensePost
Microsoft Windows 8.1 (x64) - RGNOBJ Integer Overflow (MS16-098) (2)
local
windows_x86-64
MS16-098
Metasploit
Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
local
windows_x86-64
CVE-2017-9769
redr2e
Microsoft Internet Explorer - 'mshtml.dll' Remote Code Execution (MS17-007)
remote
windows_x86-64
CVE-2017-0059;CVE-2017-0037
sleepya
Microsoft Windows 8/8.1/2012 R2 (x64) - 'EternalBlue' SMB Remote Code Execution (MS17-010)
remote
windows_x86-64
445.0
CVE-2017-0144
Juan Sacco
Microsoft Windows Server 2008 R2 (x64) - 'SrvOs2FeaToNt' SMB Remote Code Execution (MS17-010)
remote
windows_x86-64
CVE-2017-0148;CVE-2017-0147;CVE-2017-0146;CVE-2017-0145;CVE-2017-0144;CVE-2017-0143
Google Security Research
Oracle VM VirtualBox 5.0.32 r112930 (x64) - Windows Process COM Injection Privilege Escalation
local
windows_x86-64
CVE-2017-3563
Peter Baris
Windows/x64 (10) - Egghunter Shellcode (45 bytes)
windows_x86-64
45.0
sickness
Fortinet FortiClient 5.2.3 (Windows 10 x64 Post-Anniversary) - Local Privilege Escalation
local
windows_x86-64
CVE-2015-5736
sickness
Fortinet FortiClient 5.2.3 (Windows 10 x64 Pre-Anniversary) - Local Privilege Escalation
local
windows_x86-64
CVE-2015-5736
ReWolf
PCAUSA Rawether (ASUS PCE-AC56 WLAN Card Utilities Windows 10 x64) - Local Privilege Escalation
local
windows_x86-64
Peter Baris
Evostream Media Server 1.7.1 (x64) - Denial of Service
dos
windows_x86-64
CVE-2017-6427
Roziul Hasan Khan Shifat
Windows/x64 - CreateRemoteThread() DLL Injection Shellcode (584 bytes)
windows_x86-64
584.0
Saif
Microsoft Windows 8.1 (x64) - 'RGNOBJ' Integer Overflow (MS16-098)
local
windows_x86-64
MS16-098
Roziul Hasan Khan Shifat
Windows/x64 - Bind (2493/TCP) Shell + Password (h271508F) Shellcode (825 bytes)
windows_x86-64
825.0
Roziul Hasan Khan Shifat
Windows/x64 - Bind (4444/TCP) Shell Shellcode (508 bytes)
windows_x86-64
508.0
Roziul Hasan Khan Shifat
Windows/x64 - Download File (http://192.168.10.129/pl.exe) + Execute (C:/Users/Public/p.exe) Shellcode (358 bytes)
windows_x86-64
358.0
«
1
2
3
4
5
6
7
8
9
10
»
page: 8/10 [exploits: 159]