0vercl0k / CVE-2019-9810View external linksLinks
Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
☆229Dec 28, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2019-9810
Users that are interested in CVE-2019-9810 are comparing it to the libraries listed below
Sorting:
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆623Jun 13, 2020Updated 5 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 6 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Blazefox exploits for Windows 10 RS5 64-bit.☆151Dec 9, 2019Updated 6 years ago
- FileReader Exploit☆256Mar 20, 2019Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Some of my exploits.☆599Feb 25, 2021Updated 4 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- PoC☆212Jan 13, 2025Updated last year
- September Chrome 1day by István Kurucsai☆82Sep 9, 2019Updated 6 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆170Apr 3, 2019Updated 6 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Dec 30, 2018Updated 7 years ago
- CVE-2019-0604☆133Mar 22, 2019Updated 6 years ago
- 🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻☆153Feb 25, 2019Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- A Pwn2Own exploit chain☆757Nov 8, 2018Updated 7 years ago
- ☆286Apr 23, 2020Updated 5 years ago
- My Chrome and Safari exploit code + write-up repo☆531Nov 5, 2021Updated 4 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- ☆135Dec 15, 2019Updated 6 years ago
- ☆164May 18, 2018Updated 7 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆364Jan 11, 2020Updated 6 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆118Apr 19, 2018Updated 7 years ago
- CVE-2019-0859 1day Exploit☆120Feb 11, 2020Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Apache Tomcat Remote Code Execution on Windows☆189Nov 27, 2019Updated 6 years ago
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- ☆523Feb 22, 2020Updated 5 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆267Feb 27, 2019Updated 6 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Fuzzing Browsers☆314Dec 5, 2022Updated 3 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago