- [remote] Herospeed - 'TelnetSwitch' Remote Stack Overflow / Overwrite Password / Enab
- [dos] Android - 'getpidcon' Permission Bypass in KeyStore Service
- [webapps] Entrepreneur Dating Script 2.0.2 - Authentication Bypass
- [webapps] Online Test Script 2.0.7 - 'cid' SQL Injection
- [remote] Adobe Coldfusion 11.0.03.292866 - BlazeDS Java Object Deserialization Remote
- [dos] Asterisk 13.17.2 - 'chan_skinny' Remote Memory Corruption
- [webapps] Hot Scripts Clone Script Classified - Persistent Cross-Site Scripting
- [webapps] Naukri Clone Script - Persistent Cross-Site Scripting
- [webapps] Multilanguage Real Estate MLM Script - Persistent Cross-Site Scripting
- [webapps] Doctor Search Script 1.0.2 - Persistent Cross-Site Scripting
- [local] MalwareFox AntiMalware 2.74.0.150 - Privilege Escalation
- [dos] Cisco ASA - Crash PoC
- [remote] Axis Communications MPQT/PACS - Heap Overflow / Information Leakage
- [remote] Axis SSI - Remote Command Execution / Read Files
- [remote] Geovision Inc. IP Camera & Video - Remote Command Execution
- [remote] Geovision Inc. IP Camera/Video/Access Control - Multiple Remote Command Exec
- [webapps] Netis WF2419 Router - Cross-Site Scripting
- [webapps] Student Profile Management System Script 2.0.6 - Authentication Bypass
- [local] BOCHS 2.6-5 - Buffer Overflow
- [webapps] Joomla! Component JSP Tickets 1.1 - SQL Injection
- [webapps] Joomla! Component jLike 1.0 - Information Leak
- [webapps] Joomla! Component Zh GoogleMap 8.4.0.0 - SQL Injection
- [webapps] Joomla! Component Zh YandexMap 6.2.1.0 - 'id' SQL Injection
- [webapps] Joomla! Component Zh BaiduMap 3.0.0.1 - SQL Injection
- [local] MalwareFox AntiMalware 2.74.0.150 - Privilege Escalation
- [dos] Claymore Dual GPU Miner 10.5 - Format String
- [local] Apport / ABRT - chroot Privilege Escalation (Metasploit)
- [remote] Windows - MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote
- [dos] WordPress Core - 'load-scripts.php' Denial of Service
- [webapps] Online Voting System - Authentication Bypass
- [webapps] NixCMS 1.0 - 'category_id' SQL Injection
- [webapps] Matrimonial Website Script 2.1.6 - 'uid' SQL Injection
- [webapps] Wonder CMS 2.3.1 - 'Host' Header Injection
- [webapps] Wonder CMS 2.3.1 - Unrestricted File Upload
- [local] Microsoft Windows Subsystem for Linux - Privilege Escalation
- [webapps] FiberHome AN5506 - Unauthenticated Remote DNS Change
- [webapps] Oracle Hospitality Simphony (MICROS) 2.7 < 2.9 - Directory Traversal
- [webapps] Joomla! Component JMS Music 1.1.1 - SQL Injection
- [webapps] Joomla! Component Jimtawl 2.1.6 - Arbitrary File Upload
- [webapps] Joomla! Component JEXTN Classified 1.0.0 - 'sid' SQL Injection
- [shellcode] Linux/x64 - Twofish Encoded + DNS (CNAME) Password + execve(/bin/sh) Shel
- [shellcode] Linux/x64 - Custom Encoded XOR + Polymorphic + execve(/bin/sh) Shellcode
- [shellcode] Linux/x64 - Custom Encoded XOR + execve(/bin/sh) Shellcode
- [shellcode] Linux/x64 - Egghunter (0xbeefbeef) Shellcode (34 bytes)
- [shellcode] Linux/x64 - Reverse TCP (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (
- [shellcode] Linux/x64 - Bind TCP (4444/TCP) Shell (/bin/sh) + Password (1234567) Shel
- [webapps] Joomla! Component JEXTN Reverse Auction 3.1.0 - SQL Injection
- [webapps] Event Manager 1.0 - SQL Injection
- [webapps] Joomla! Component JE PayperVideo 3.0.0 - 'usr_plan' SQL Injection
- [webapps] IPSwitch MOVEit 8.1 < 9.4 - Cross-Site Scripting
- [papers] Web Application Firewall (WAF) Evasion Techniques
- [papers] Jailbreaking iOS 11.1.2: An adventure into the XNU kernel
- [papers] [Hebrew] Digital Whisper Security Magazine #91
- [webapps] Advance Loan Management System - 'id' SQL Injection
- [webapps] Real Estate Custom Script - 'route' SQL Injection
- [webapps] Fancy Clone Script - 'search_browse_product' SQL Injection
- [webapps] Joomla! Component JEXTN Membership 3.1.0 - 'usr_plan' SQL Injection
- [remote] BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit)
- [dos] WebKit - 'detachWrapper' Use-After-Free
- [remote] Sync Breeze Enterprise 10.4.18 - Remote Buffer Overflow (SEH)
- [local] systemd (systemd-tmpfiles) < 236 - 'fs.protected_hardlinks=0' Local Privilege
- [webapps] BMC BladeLogic RSCD Agent 8.3.00.64 - Windows Users Disclosure
- [webapps] Joomla! Component Visual Calendar 3.1.3 - 'id' SQL Injection
- [webapps] Joomla! Component CP Event Calendar 3.0.1 - 'id' SQL Injection
- [webapps] Joomla! Component Picture Calendar for Joomla 3.1.4 - Directory Traversal
- [dos] LabF nfsAxe 3.7 TFTP Client - Local Buffer Overflow
- [local] System Shield 5.0.0.136 - Privilege Escalation
- [webapps] Advantech WebAccess < 8.3 - SQL Injection
- [remote] HPE iMC 7.3 - RMI Java Deserialization
- [local] Arq 5.10 - Local root Privilege Escalation (2)
- [local] Arq 5.10 - Local root Privilege Escalation
- [remote] Oracle WebLogic - wls-wsat Component Deserialization Remote Code Execution (
- [dos] macOS - 'sysctl_vfs_generic_conf' Stack Leak Through Struct Padding
- [webapps] KeystoneJS < 4.0.0-beta.7 - Cross-Site Request Forgery
- [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) Null Free
- [remote] Trend Micro Threat Discovery Appliance 2.6.1062r1 - 'dlp_policy_upload.cgi'
- [webapps] Netis WF2419 Router - Cross-Site Request Forgery
- [webapps] Buddy Zone 2.9.9 - SQL Injection
- [webapps] Multilanguage Real Estate MLM Script 3.0 - 'srch' SQL Injection
- [webapps] Hot Scripts Clone - 'subctid' SQL Injection
- [webapps] TSiteBuilder 1.0 - SQL Injection
- [webapps] Task Rabbit Clone 1.0 - 'id' SQL Injection
- [webapps] Joomla! Component Jtag Members Directory 5.3.7 - Arbitrary File Download
- [webapps] Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery
- [webapps] Nexpose < 6.4.66 - Cross-Site Request Forgery
- [shellcode] Linux/x86 - Egghunter Shellcode (12 Bytes)
- [webapps] Gnew 2018.1 - Cross-Site Request Forgery
- [webapps] PACSOne Server 6.6.2 DICOM Web Viewer - SQL Injection
- [webapps] PACSOne Server 6.6.2 DICOM Web Viewer - Directory Trasversal
- [papers] ARM Exploitation for IoT
- [dos] Artifex MuJS 1.0.2 - Integer Overflow
- [dos] Artifex MuJS 1.0.2 - Denial of Service
- [remote] BMC BladeLogic 8.3.00.64 - Remote Command Execution
- [webapps] WordPress Plugin Learning Management System - 'course_id' SQL Injection
- [webapps] ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password
- [remote] Exodus Wallet (ElectronJS Framework) - Remote Code Execution
- [webapps] Dodocool DC38 N300 - Cross-site Request Forgery
- [shellcode] Linux/x86 - Disable ASLR Security Obfuscated Shellcode (23 bytes)
- [webapps] ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities
- [webapps] ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download
- [webapps] ManageEngine OpManager / Applications Manager / IT360 - 'FailOverServlet' M
- [webapps] ManageEngine EventLog Analyzer - Multiple Vulnerabilities (2)
- [webapps] ManageEngine Desktop Central / Desktop Central MSP - Create Administrator
- [dos] Lorex LH300 Series - ActiveX Buffer Overflow (PoC)
- [shellcode] Linux/x86 - execve(/bin/sh) + ROT-N + Shift-N + XOR-N Encoded Shellcode (
- [webapps] CMS Made Simple 1.11.9 - Multiple Vulnerabilities
- [webapps] GetSimple CMS 3.3.1 - Cross-Site Scripting
- [local] ICU library 52 < 54 - Multiple Vulnerabilities
- [webapps] Pimcore CMS 1.4.9
- [webapps] SysAid Help Desk 14.4 - Multiple Vulnerabilities
- [webapps] Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities
- [webapps] BMC Track-It! 11.4 - Multiple Vulnerabilities
- [webapps] Kaseya Virtual System Administrator (VSA) 7.0 < 9.1 - Authenticated Arbitra
- [remote] AsusWRT Router < 3.0.0.4.380.7743 - Unauthenticated LAN Remote Code Executio
- [papers] HackSysTeam Windows Kernel Vulnerable Driver: Type Confusion Vulnerability E
- [local] Blizzard Update Agent - JSON RPC DNS Rebinding
- [local] Oracle VirtualBox < 5.1.30 / < 5.2-rc1 - Guest to Host Escape
- [remote] GoAhead Web Server - LD_PRELOAD Arbitrary Module Load (Metasploit)
- [remote] Kaltura - Remote PHP Code Execution over Cookie (Metasploit)
- [local] Sync Breeze Enterprise 9.5.16 - Import Command Buffer Overflow (Metasploit)
- [webapps] WordPress Plugin Email Subscribers & Newsletters 3.4.7 - Information Disclo
- [remote] RAVPower 2.000.056 - Root Remote Code Execution
- [webapps] Professional Local Directory Script 1.0 - SQL Injection
- [papers] Hardcore SAP Penetration Testing
- [webapps] Flexible Poll 1.2 - SQL Injection
- [webapps] Quickad 4.0 - SQL Injection
- [webapps] Photography CMS 1.0 - Cross-Site Request Forgery (Add Admin)
- [webapps] Tumder 2.1 - SQL Injection
- [webapps] Zechat 1.5 - SQL Injection
- [webapps] Wchat 1.5 - SQL Injection
- [webapps] Easy Car Script 2014 - SQL Injection
- [webapps] RSVP Invitation Online 1.0 - Cross-Site Request Forgery (Update Admin)
- [webapps] Affiligator 2.1.0 - SQL Injection
- [webapps] LiveCRM SaaS Cloud 1.0 - SQL Injection
- [local] HP Connected Backup 8.6/8.8.6 - Local Privilege Escalation
- [webapps] NEC Univerge SV9100/SV8100 WebPro 10.0 - Configuration Download
- [papers] Hardcore SAP Penetration Testing
- [webapps] CentOS Web Panel 0.9.8.12 - 'row_id' / 'domain' SQL Injection
- [dos] RAVPower 2.000.056 - Memory Disclosure
- [dos] MixPad 5.00 - Buffer Overflow
- [papers] Metasploit Pivoting
- [webapps] OTRS 5.0.x/6.0.x - Remote Command Execution
- [webapps] PHPFreeChat 1.7 - Denial of Service
- [papers] Metasploit Pivoting
- [webapps] CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities
- [webapps] Shopware 5.2.5/5.3 - Cross-Site Scripting
- [webapps] Oracle JDeveloper 11.1.x/12.x - Directory Traversal
- [webapps] DarkComet (C2 Server) - File Upload
- [webapps] D-Link DNS-325 ShareCenter < 1.05B03 - Multiple Vulnerabilities
- [webapps] D-Link DNS-343 ShareCenter < 1.05 - Command Injection
- [webapps] Synology Photostation < 6.7.2-3429 - Multiple Vulnerabilities
- [webapps] Mambo < 4.5.4 - SQL Injection
- [webapps] X-Cart < 4.1.3 - Arbitrary Variable Overwrite
- [webapps] Claroline < 1.7.7 - Arbitrary File Inclusion
- [webapps] CubeCart < 3.0.12 - Multiple Vulnerabilities
- [webapps] SquirrelMail < 1.4.7 - Arbitrary Variable Overwrite
- [webapps] PHPLib < 7.4 - SQL Injection
- [webapps] Gallery 2 < 2.0.2 - Multiple Vulnerabilities
- [webapps] phpRPC < 0.7 - Remote Code Execution
- [webapps] Mambo < 4.5.3h - Multiple Vulnerabilities
- [webapps] PEAR LiveUser < 0.16.8 - Arbitrary File Access
- [webapps] Geeklog < 1.4.0 - Multiple Vulnerabilities
- [webapps] ADOdb < 4.71 - Cross Site Scripting
- [webapps] XPCOM - Race Condition
- [webapps] SquirrelMail < 1.4.5-RC1 - Arbitrary Variable Overwrite
- [webapps] PHPXMLRPC < 1.1 - Remote Code Execution
- [webapps] PEAR XML_RPC < 1.3.0 - Remote Code Execution
- [webapps] XOOPS < 2.0.11 - Multiple Vulnerabilities
- [dos] Peercast < 0.1211 - Format String
- [webapps] Burning Board < 2.3.1 - SQL Injection
- [webapps] Invision Power Board (IP.Board) < 2.0.3 - Multiple Vulnerabilities
- [webapps] AZBB < 1.0.07d - Multiple Vulnerabilities
- [webapps] PhotoPost < 4.85 - Multiple Vulnerabilities
- [webapps] TikiWiki < 1.8.1 - Multiple Vulnerabilities
- [webapps] PhotoPost < 4.6 - Multiple Vulnerabilities
- [webapps] Invision Gallery < 1.0.1 - SQL Injection
- [webapps] Invision Power Top Site List < 1.1 RC 2 - SQL Injection
- [webapps] phpBB < 2.0.7a - Multiple Vulnerabilities
- [webapps] Mambo < 4.5 - Multiple Vulnerabilities
- [webapps] vBulletin < 3.0.0 RC4 - Cross Site Scripting
- [webapps] Phorum < 5.0.3 Beta - Cross Site Scripting
- [webapps] phpBB < 2.0.6d - Cross Site Scripting
- [webapps] Invision Power Board (IP.Board) < 1.3 - SQL Injection
- [local] Trillian Pro < 2.01 - Design Error
- [webapps] phpShop < 0.6.1-b - Multiple Vulnerabilities
- [webapps] phpGedView < 2.65 beta 5 - Multiple Vulnerabilities
- [webapps] MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities
- [webapps] PostNuke < 0.726 Phoenix - Multiple Vulnerabilities
- [webapps] osCommerce < 2.2-MS2 - Multiple Vulnerabilities
- [webapps] ASPapp Multiple Products - Multiple Vulnerabilities
- [webapps] AutoRank PHP < 2.0.4 - SQL Injection (PoC)
- [webapps] Aardvark Topsites < 4.1.0 - Multiple Vulnerabilities
- [webapps] Invision Power Board (IP.Board) < 2.0 Alpha 3 - SQL Injection (PoC)
- [webapps] Invision Power Top Site List < 2.0 Alpha 3 - SQL Injection (PoC)
- [webapps] DUWare Multiple Products - Multiple Vulnerabilities
- [papers] [Kernel Exploitation] 5: Integer Overflow
- [papers] [Kernel Exploitation] 4: Stack Buffer Overflow (SMEP Bypass)
- [papers] [Kernel Exploitation] 3: Stack Buffer Overflow (Windows 7 x86/x64)
- [papers] [Kernel Exploitation] 2: Payloads
- [papers] [Kernel Exploitation] 1: Setting up the environment
- [dos] macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking
- [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password
- [webapps] GitStack 2.3.10 - Unauthenticated Remote Code Execution
- [dos] Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service
- [local] glibc - 'getcwd()' Local Privilege Escalation
- [shellcode] Windows/x86 (XP SP3) - MessageBox Shellcode (11 bytes)
- [shellcode] Windows/x86 (XP SP3) (English) - calc Shellcode (16 bytes)
- [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (42 bytes)
- [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (52 bytes)
- [shellcode] Windows/x86 (XP SP3) (Turkish) - calc.exe Shellcode (53 bytes)
- [shellcode] Windows/x86 (XP SP3) (Turkish) - MessageBoxA Shellcode (109 bytes)
- [shellcode] Windows/x86 - Message Box + Null-Free Shellcode (140 bytes)
- [shellcode] Windows/x86 - calc.exe + Null-Free Shellcode (100 bytes)
- [shellcode] Windows/x86 - Download File (http://skypher.com/dll) + LoadLibrary + Null
- [shellcode] Windows/x86 (XP Professional SP3) (French) - calc.exe Shellcode (31 bytes
- [shellcode] Windows/x86 (XP Professional SP2) - calc Shellcode (57 bytes)
- [shellcode] Windows/x86 (XP Professional SP2) (English) - Wordpad Shellcode (15 bytes
- [shellcode] Windows/x86 (XP SP3) (French) - Sleep 90 Seconds Shellcode (14 bytes)
- [shellcode] Windows/x86 - Create Admin User (X) Shellcode (304 bytes)
- [shellcode] Windows/x86 (2000) - Reverse TCP (192.168.0.247:8721/TCP) Connect + Vampi
- [shellcode] Windows/x86 (NT/XP/2000/2003) - Bind TCP (8721/TCP) Shell Shellcode (356
- [shellcode] Linux/x86 - ROT-7 Encodor + Decoder execve Shellcode (74 bytes)
- [shellcode] Linux/x86 - setreuid() + execve(/usr/bin/python) Shellcode (54 bytes)
- [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:1337/TCP) Shell Shellcode (74 bytes)
- [shellcode] Linux/x86 - Bind TCP (1337/TCP) Shell Shellcode (89 bytes)
- [shellcode] Linux/x86 - shutdown -h now Shellcode (56 bytes)
- [shellcode] Linux/x86 - chmod 0777 /etc/shadow + Obfuscated Shellcode (51 bytes)
- [shellcode] Linux/x86 - JMP-FSTENV execve Shellcode (67 bytes)
- [shellcode] Linux/x86 - shift-bit execve Encoder Shellcode (114 bytes)
- [shellcode] Linux/x86 - Copy /etc/passwd to /tmp/outfile Shellcode (97 bytes)
- [shellcode] Linux/x86 - execve(/bin/sh) Using jump/call/pop Shellcode (52 bytes)
- [shellcode] Linux/x86 - Download (http://192.168.2.222/x) + chmod() + execute Shellco
- [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:12345/TCP) cat /etc/passwd Shellcode (
- [shellcode] Linux/x86 - Bind TCP Shell Shellcode (112 bytes)
- [shellcode] Linux/x86 - execve(/bin/sh) + Obfuscated Shellcode (30 bytes)
- [shellcode] Linux/x86 - Egghunter (0x5090) Shellcode (38 bytes)
- [shellcode] Linux/x86 - /proc/sys/net/ipv4/ip_forward 0 + exit() Shellcode (83 bytes)
- [shellcode] Linux/x86 - Bind TCP (31337/TCP) Shell Shellcode (108 bytes)
- [shellcode] Linux/x86 - Uzumaki Encryptor Shellcode (Generator)
- [shellcode] Linux/x86 - execve(/bin/shUzumaki) + Uzumaki Encoded + Null-Free Shellcod
- [shellcode] Linux/x86 - execve wget + Mutated + Null-Free Shellcode (96 bytes)
- [shellcode] Linux/x86 - Fork Bomb + Mutated + Null-Free Shellcode (15 bytes)
- [shellcode] Linux/x86 - Reboot + Mutated + Null-Free Shellcode (55 bytes)
- [shellcode] Linux/x86 - Read /etc/passwd file + Null-Free Shellcode (51 bytes)
- [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (6)
- [shellcode] Linux/x86 - Insertion Decoder Shellcode (33+ bytes)
- [webapps] Primefaces 5.x - Remote Code Execution (Metasploit)
- [shellcode] Linux/x86 - Egg Hunter Shellcode (38 bytes)
- [shellcode] Linux/x86 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
- [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell Shellcode (73 bytes)