bzyo

68 exploits Active since Mar 2014
EIP-2026-119532 EXPLOITDB python WORKING POC
Iperius Backup 5.8.1 - Buffer Overflow (SEH)
EIP-2026-119536 EXPLOITDB python WORKING POC
LanSpy 2.0.1.159 - Buffer Overflow (SEH) (Egghunter)
EIP-2026-119537 EXPLOITDB python WORKING POC
LanSpy 2.0.1.159 - Buffer Overflow (SEH) (Egghunter)
EIP-2026-119538 EXPLOITDB python WORKING POC
MAGIX Music Editor 3.1 - Buffer Overflow (SEH)
EIP-2026-119539 EXPLOITDB python WORKING POC
MAGIX Music Editor 3.1 - Buffer Overflow (SEH)
EIP-2026-119560 EXPLOITDB python WORKING POC
Terminal Services Manager 3.1 - Local Buffer Overflow (SEH)
EIP-2026-119648 EXPLOITDB python WORKING POC
R 3.4.4 (Windows 10 x64) - Buffer Overflow (DEP/ASLR Bypass)
EIP-2026-119649 EXPLOITDB python WORKING POC
R 3.4.4 (Windows 10 x64) - Buffer Overflow SEH (DEP/ASLR Bypass)
EIP-2026-119650 EXPLOITDB python WORKING POC
R 3.4.4 (Windows 10 x64) - Buffer Overflow SEH (DEP/ASLR Bypass)
CVE-2018-10079 EXPLOITDB HIGH text WORKING POC
Geist WatchDog Console <3.2.2 - Info Disclosure
Geist WatchDog Console 3.2.2 uses a weak ACL for the C:\ProgramData\WatchDog Console directory, which allows local users to modify configuration data by updating (1) config.xml or (2) servers.xml.
CVSS 7.8
EIP-2026-118604 EXPLOITDB python WORKING POC
GetGo Download Manager 5.3.0.2712 - Buffer Overflow (SEH)
EIP-2026-118095 EXPLOITDB text WORKING POC
WebLog Expert Enterprise 9.4 - Privilege Escalation
EIP-2026-117987 EXPLOITDB text WORKING POC
Sysax FTP Automation 6.9.0 - Privilege Escalation
EIP-2026-117952 EXPLOITDB text WORKING POC
Splinterware System Scheduler Pro 5.12 - Privilege Escalation
EIP-2026-117951 EXPLOITDB python WORKING POC
Splinterware System Scheduler Pro 5.12 - Buffer Overflow (SEH)
EIP-2026-117856 EXPLOITDB python WORKING POC
RGui 3.5.0 - Local Buffer Overflow (SEH)(DEP Bypass)
EIP-2026-117854 EXPLOITDB python WORKING POC
RGui 3.4.4 - Local Buffer Overflow
EIP-2026-117855 EXPLOITDB python WORKING POC
RGui 3.5.0 - Local Buffer Overflow (SEH)(DEP Bypass)
CVE-2018-9131 EXPLOITDB python WORKING POC
(pending title)
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
EIP-2026-117393 EXPLOITDB text WORKING POC
LabF nfsAxe 3.7 - Privilege Escalation
EIP-2026-117357 EXPLOITDB python WORKING POC
IrfanView 4.50 Email Plugin - Buffer Overflow (SEH Unicode)
EIP-2026-116882 EXPLOITDB python WORKING POC
Base64 Decoder 1.1.2 - Local Buffer Overflow (SEH)
EIP-2026-116743 EXPLOITDB python WORKING POC
AgataSoft Auto PingMaster 1.5 - Buffer Overflow (SEH)
EIP-2026-117356 EXPLOITDB python WORKING POC
IrfanView 4.44 Email Plugin - Buffer Overflow (SEH)
EIP-2026-117350 EXPLOITDB text WORKING POC
Iperius Backup 6.1.0 - Privilege Escalation