0vercl0k

13 exploits Active since Jan 2013
CVE-2021-31166 NOMISEC CRITICAL WORKING POC
Windows IIS HTTP Protocol Stack DOS
HTTP Protocol Stack Remote Code Execution Vulnerability
829 stars
CVSS 9.8
CVE-2019-11708 NOMISEC CRITICAL WORKING POC
Firefox ESR < 60.7.2, Firefox < 67.0.4, Thunderbird < 60.7.2 - RCE
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
623 stars
CVSS 10.0
CVE-2022-21971 NOMISEC HIGH WRITEUP
Windows Runtime - RCE
Windows Runtime Remote Code Execution Vulnerability
306 stars
CVSS 7.8
CVE-2021-24086 NOMISEC HIGH WORKING POC
Microsoft Windows 10 - Denial of Service
Windows TCP/IP Denial of Service Vulnerability
235 stars
CVSS 7.5
CVE-2019-9810 NOMISEC HIGH WORKING POC
Firefox < 66.0.1 - Buffer Overflow
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
229 stars
CVSS 8.8
CVE-2021-28476 NOMISEC CRITICAL WORKING POC
Microsoft Windows 10 - Remote Code Execution
Windows Hyper-V Remote Code Execution Vulnerability
226 stars
CVSS 9.9
CVE-2022-28281 NOMISEC HIGH WORKING POC
Mozilla Firefox < 99.0 - Out-of-Bounds Write
If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
74 stars
CVSS 8.8
CVE-2022-21974 NOMISEC HIGH WRITEUP
Roaming Security Rights Management Services - RCE
Roaming Security Rights Management Services Remote Code Execution Vulnerability
60 stars
CVSS 7.8
CVE-2021-32537 NOMISEC MEDIUM WRITEUP
Realtek Hda Driver < 9150 - Memory Corruption
Realtek HAD contains a driver crashed vulnerability which allows local side attackers to send a special string to the kernel driver in a user’s mode. Due to unexpected commands, the kernel driver will cause the system crashed.
57 stars
CVSS 6.5
CVE-2019-9791 NOMISEC CRITICAL WORKING POC
Thunderbird <60.6-Firefox <66 - Memory Corruption
The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
2 stars
CVSS 9.8
CVE-2019-11708 VULNCHECK_XDB CRITICAL WORKING POC
Firefox ESR < 60.7.2, Firefox < 67.0.4, Thunderbird < 60.7.2 - RCE
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
CVSS 10.0
CVE-2019-1184 EXPLOITDB MEDIUM WORKING POC
Windows Core Shell COM Server Registrar - Privilege Escalation
An elevation of privilege vulnerability exists when Windows Core Shell COM Server Registrar improperly handles COM calls. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting unprotected COM calls.
CVSS 6.7
CVE-2013-0008 EXPLOITDB text WORKING POC
Microsoft Windows Vista - Access Control
win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."