tarantula-team / CVE-2019-12949
CVE-2019-12949
☆26Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2019-12949
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 4 years ago
- Abusing SketchUp to make persistence on Windows☆20Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 4 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Updated 6 years ago
- CVE-2019-10149 privilege escalation☆8Updated 5 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- Security Advisories☆10Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Security Research☆36Updated 2 years ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆20Updated 5 years ago
- ☆17Updated 5 years ago
- Slide deck for DefCon Beijing☆39Updated 6 years ago
- Synaptics Audio Driver LPE☆35Updated 5 years ago
- CVE-2018-6546-Exploit☆41Updated 6 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.