- [dos] WebKit - 'WebCore::SimpleLineLayout::RunResolver::runForPoi nt' Out-of-Bounds Re
- [dos] WebKit - 'WebCore::Style::TreeResolver::styleForElement' Use-After-Free
- [dos] WebKit - 'WebCore::SVGPatternElement::collectPatternAttribu tes' Out-of-Bounds R
- [dos] WebKit - 'WebCore::RenderText::localCaretRect' Out-of-Bounds Read
- [dos] WebKit - 'WebCore::PositionIterator::decrement' Use-After-Free
- [dos] WebKit - 'WebCore::InputType::element' Use-After-Free
- [dos] WebKit - 'WebCore::TreeScope::documentScope' Use-After-Free
- [webapps] Icon Time Systems RTC-1000 Firmware 2.5.7458 - Cross-Site Scripting
- [dos] Vonage VDV-23 - Denial of Service
- [dos] Microsoft Windows 10 - 'nt!NtQueryDirectoryFile (luafv!LuafvCopyDirectoryEntry)
- [remote] Microsoft Office - OLE Remote Code Execution
- [local] Microsoft Windows 10 - CiSetFileCache TOCTOU Security Feature Bypass
- [dos] iOS < 11.1 / tvOS < 11.1 / watchOS < 4.1 - Denial of Service
- [papers] Reversing and Exploiting IoT devices
- [papers] [Hebrew] Digital Whisper Security Magazine #88
- [webapps] MyBB 1.8.13 - Remote Code Execution
- [webapps] MyBB 1.8.13 - Cross-Site Scripting
- [local] VX Search 10.2.14 - 'Proxy' Buffer Overflow (SEH)
- [webapps] Zeta Components Mail 1.8.1 - Remote Code Execution
- [dos] Microsoft Edge Chakra JIT - Type Confusion with switch Statements
- [dos] Microsoft Edge Chakra: JIT - 'Lowerer::LowerBoundCheck' Incorrect Integer Overf
- [dos] Microsoft Edge Chakra: JIT - 'OP_Memset' Type Confusion
- [dos] Microsoft Edge - 'Object.setPrototypeOf' Memory Corruption
- [webapps] Vonage VDV23 - Cross-Site Scripting
- [webapps] TP-Link TL-WR740N - Cross-Site Scripting
- [webapps] LanSweeper 6.0.100.75 - Cross-Site Scripting
- [dos] D-Link DIR605L - Denial of Service
- [webapps] D-Link DCS-936L Network Camera - Cross-Site Request Forgery
- [remote] Dup Scout Enterprise 10.0.18 - 'Login' Buffer Overflow
- [dos] Microsoft Internet Explorer 11 - 'jscript!JsErrorToString' Use-After-Free
- [remote] Mako Server 2.5 - OS Command Injection Remote Command Execution (Metasploit)
- [dos] PHP 7.1.8 - Heap-Based Buffer Overflow
- [remote] D-Link DIR-850L - Unauthenticated OS Command Execution (Metasploit)
- [dos] PSFTPd Windows FTP Server 10.0.4 Build 729 - Log Injection / Use-After-Free
- [remote] Wireless IP Camera (P2P) WIFICAM - Unauthenticated Remote Code Execution
- [remote] Ulterius Server < 1.9.5.0 - Directory Traversal
- [webapps] Kirby CMS < 2.5.7 - Cross-Site Scripting
- [local] IKARUS anti.virus 2.16.7 - 'ntguard_x64' Privilege Escalation
- [webapps] Web Viewer 1.0.0.193 (Samsung SRN-1670D) - Unrestricted File Upload
- [dos] Xlight FTP Server 3.8.8.5 - Buffer Overflow (PoC)
- [webapps] ManageEngine Applications Manager 13 - SQL Injection
- [local] Vir.IT eXplorer Anti-Virus 8.5.39 - 'VIAGLT64.SYS' Privilege Escalation
- [webapps] Ingenious School Management System 2.3.0 - 'friend_index' SQL injection
- [dos] WhatsApp 2.17.52 - Memory Corruption
- [webapps] WordPress Plugin JTRT Responsive Tables 4.1 - SQL Injection
- [webapps] OctoberCMS 1.0.426 (Build 426) - Cross-Site Request Forgery
- [local] Easy MPEG/AVI/DIVX/WMV/RM to DVD - 'Enter User Name' Buffer Overflow (SEH)
- [dos] GraphicsMagick - Memory Disclosure / Heap Overflow
- [remote] tnftp - 'savefile' Arbitrary Command Execution (Metasploit)
- [webapps] Ladon Framework for Python 0.9.40 - XML External Entity Expansion
- [webapps] Oracle PeopleSoft Enterprise PeopleTools < 8.55 - Remote Code Execution Via
- [dos] Ipswitch WS_FTP Professional < 12.6.0.3 - Local Buffer Overflow (SEH)
- [webapps] WordPress Plugin Userpro < 4.9.17.1 - Authentication Bypass
- [remote] Actiontec C1000A Modem - Backdoor Account
- [dos] Debut Embedded httpd 1.20 - Denial of Service
- [dos] Avaya OfficeScan (IPO) < 10.1 - ActiveX Buffer Overflow
- [remote] Avaya OfficeScan (IPO) < 10.1 - 'SoftConsole' Buffer Overflow (SEH)
- [webapps] Logitech Media Server 7.9.0 - 'favorites' Cross-Site Scripting
- [webapps] Logitech Media Server 7.9.0 - 'Radio URL' Cross-Site Scripting
- [dos] SMPlayer 17.11.0 - '.m3u' Buffer Overflow (PoC)
- [papers] PoC || GTFO 0x16
- [local] Linux Kernel 4.13 (Ubuntu 17.10) - 'waitid()' SMEP/SMAP/Chrome Sandbox Privil
- [webapps] pfSense 2.3.1_1 - Command Execution
- [webapps] Oracle Java SE - Web Start jnlp XML External Entity Processing Information
- [remote] ZyXEL PK5001Z Modem - Backdoor Account
- [webapps] pfSense 2.3.1_1 - Command Execution
- [webapps] ManageEngine Applications Manager 13 - SQL Injection
- [local] Linux Kernel 4.13 - 'waitid()' SMEP/SMAP Privilege Escalation
- [papers] PoC || GTFO 0x16
- [dos] SMPlayer 17.11.0 - '.m3u' Buffer Overflow (PoC)
- [webapps] Logitech Media Server 7.9.0 - 'favorites' Cross-Site Scripting
- [webapps] Logitech Media Server 7.9.0 - 'Radio URL' Cross-Site Scripting
- [remote] Avaya OfficeScan (IPO) < 10.1 - 'SoftConsole' Buffer Overflow (SEH)
- [dos] Avaya OfficeScan (IPO) < 10.1 - ActiveX Buffer Overflow
- [dos] Debut Embedded httpd 1.20 - Denial of Service
- [remote] Actiontec C1000A Modem - Backdoor Account
- [webapps] WordPress Plugin Userpro < 4.9.17.1 - Authentication Bypass
- [dos] Ipswitch WS_FTP Professional < 12.6.0.3 - Local Buffer Overflow (SEH)
- [webapps] Oracle PeopleSoft Enterprise PeopleTools < 8.55 - Remote Code Execution Via
- [webapps] Ladon Framework for Python 0.9.40 - XML External Entity Expansion
- [dos] GraphicsMagick - Memory Disclosure / Heap Overflow
- [remote] tnftp - 'savefile' Arbitrary Command Execution (Metasploit)
- [webapps] WordPress Plugin JTRT Responsive Tables 4.1 - SQL Injection
- [local] Vir.IT eXplorer Anti-Virus - Privilege Escalation
- [webapps] Ingenious School Management System 2.3.0 - 'friend_index' SQL injection
- [dos] WhatsApp 2.17.52 - Memory Corruption
- [webapps] OctoberCMS 1.0.426 (Build 426) - Cross-Site Request Forgery
- [remote] ZyXEL PK5001Z Modem - Backdoor Account
- [local] Easy MPEG/AVI/DIVX/WMV/RM to DVD - 'Enter User Name' Buffer Overflow (SEH)
- [webapps] Oracle Java SE - Web Start jnlp XML External Entity Processing Information
- [webapps] Shareet - 'photo' SQL Injection
- [webapps] US Zip Codes Database - 'state' SQL Injection
- [webapps] Newspaper 1.0 - SQL Injection
- [webapps] Sokial Social Network Script 1.0 - SQL Injection
- [webapps] tPanel 2009 - Authentication Bypass
- [webapps] Vastal I-Tech Dating Zone 0.9.9 - 'product_id' SQL Injection
- [webapps] ZeeBuddy 2x - 'groupid' SQL Injection
- [webapps] Protected Links - SQL Injection
- [webapps] AROX School ERP PHP Script - 'id' SQL Injection
- [webapps] SoftDatepro Dating Social Network 1.3 - SQL Injection
- [webapps] Joomla! Component NS Download Shop 2.2.6 - 'id' SQL Injection
- [webapps] MyBuilder Clone 1.0 - 'subcategory' SQL Injection
- [webapps] Same Sex Dating Software Pro 1.0 - SQL Injection
- [webapps] Job Board Script - 'nice_theme' SQL Injection
- [webapps] Joomla! Component Zh YandexMap 6.1.1.0 - 'placemarklistid' SQL Injection
- [webapps] Mailing List Manager Pro 3.0 - SQL Injection
- [webapps] iStock Management System 1.0 - Arbitrary File Upload
- [webapps] PG All Share Video 1.0 - SQL Injection
- [webapps] PHP CityPortal 2.0 - SQL Injection
- [webapps] iProject Management System 1.0 - 'ID' SQL Injection
- [webapps] Article Directory Script 3.0 - 'id' SQL Injection
- [webapps] Adult Script Pro 2.2.4 - SQL Injection
- [webapps] D-Park Pro 1.0 - SQL Injection
- [webapps] iTech Gigs Script 1.21 - SQL Injection
- [webapps] PHPMyFAQ 2.9.8 - Cross-Site Scripting (3)
- [webapps] Ingenious 2.3.0 - Arbitrary File Upload
- [webapps] Online Exam Test Application - 'sort' SQL Injection
- [webapps] Php Inventory - Arbitrary File Upload
- [webapps] Zomato Clone Script - 'resid' SQL Injection
- [webapps] Website Broker Script - 'status_id' SQL Injection
- [webapps] Vastal I-Tech Agent Zone - SQL Injection
- [webapps] WordPress Plugin Ultimate Product Catalog 4.2.24 - PHP Object Injection
- [webapps] phpMyFAQ 2.9.8 - Cross-Site Request Forgery
- [webapps] PHP Melody 2.6.1 - SQL Injection
- [remote] MitraStar DSL-100HN-T1/GPT-2541GNAC - Privilege Escalation
- [dos] Tizen Studio 1.3 Smart Development Bridge
- [remote] DameWare Remote Controller
- [local] HitmanPro 3.7.15 Build 281 - Kernel Pool Overflow
- [local] PHPMailer
- [remote] Netgear DGN1000 1.1.00.48 - Setup.cgi Unauthenticated Remote Code Execution
- [webapps] KeystoneJS 4.0.0-beta.5 - CSV Excel Macro Injection
- [webapps] KeystoneJS 4.0.0-beta.5 - Cross-Site Scripting
- [webapps] FS Trademe Clone - 'id' SQL Injection
- [webapps] FS Thumbtack Clone - 'ser' SQL Injection
- [webapps] FS Monster Clone - 'id' SQL Injection
- [webapps] FS Care Clone - 'sitterService' SQL Injection
- [webapps] FS Realtor Clone - 'id' SQL Injection
- [webapps] FS Crowdfunding Script - 'id' SQL Injection
- [webapps] FS Shutter Stock Clone - 'keywords' SQL Injection
- [webapps] Mura CMS < 6.2 - Server-Side Request Forgery / XML External Entity Injectio
- [webapps] FS Ebay Clone - 'pd_maincat_id' Parameter SQL Injection
- [webapps] FS Expedia Clone - 'hid' SQL Injection
- [webapps] FS Groupon Clone - 'category' SQL Injection
- [webapps] FS Lynda Clone - 'category' SQL Injection
- [webapps] FS Indiamart Clone - 'keywords' SQL Injection
- [webapps] FS Freelancer Clone - 'sk' SQL Injection
- [webapps] FS Food Delivery Script - 'keywords' SQL Injection
- [webapps] FS Car Rental Script - 'pickup_location' Parameter SQL Injection
- [webapps] FS Amazon Clone - 'category_id' Parameter SQL Injection
- [webapps] FS OLX Clone - 'catg_id' Parameter SQL Injection
- [webapps] FS Book Store Script - 'category' Parameter SQL Injection
- [local] Mikogo 5.4.1.160608 - Local Credentials Disclosure
- [remote] Polycom - Command Shell Authorization Bypass (Metasploit)
- [remote] Unitrends UEB 9 - bpserverd Authentication Bypass Remote Command Execution (
- [remote] Unitrends UEB 9 - http api/storage Remote Root (Metasploit)
- [local] Linux Kernel 4.14.0-rc4+ - 'waitid()' Privilege Escalation
- [webapps] Kaltura
- [webapps] CometChat < 6.2.0 BETA 1 - Local File Inclusion
- [dos] ArGoSoft Mini Mail Server 1.0.0.2 - Denial of Service
- [remote] Ayukov NFTP FTP Client
- [webapps] TP-Link TL-MR3220 - Cross-Site Scripting
- [webapps] Logitech Media Server - Cross-Site Scripting
- [webapps] TP-Link WR940N - Authenticated Remote Code Exploit
- [webapps] Check_MK 1.2.8p25 - Information Disclosure
- [dos] Mozilla Firefox < 55 - Denial of Service
- [webapps] ZKTime Web Software 2.0 - Improper Access Restrictions
- [webapps] ZKTime Web Software 2.0 - Cross-Site Request Forgery
- [local] Microsoft Game Definition File Editor 6.3.9600 - XML External Entity Injectio
- [papers] Hacksys Extreme Vulnerable Windows Driver analysis Part 1
- [dos] Xen - Unbounded Recursion in Pagetable De-typing
- [webapps] Afian AB FileRun 2017.03.18 - Multiple Vulnerabilities
- [webapps] Linksys E Series - Multiple Vulnerabilities
- [webapps] Wordpress Plugin Car Park Booking - SQL Injection
- [webapps] Career Portal 1.0 - SQL Injection
- [dos] Linux Kernel - 'AF_PACKET' Use-After-Free
- [webapps] Apache Solr 7.0.1 - XML External Entity Expansion / Remote Code Execution
- [remote] Tomcat - Remote Code Execution via JSP Upload Bypass (Metasploit)
- [local] Shadowsocks - Log File Command Execution
- [local] shadowsocks-libev 3.1.0 - Command Execution
- [webapps] OpenText Documentum Content Server - Arbitrary File Download
- [webapps] OpenText Documentum Content Server - dmr_content Privilege Escalation
- [webapps] OpenText Documentum Content Server - Arbitrary File Download Privilege Esca
- [webapps] OpenText Documentum Content Server - Privilege Escalation
- [dos] Microsoft Windows - 'nt!NtQueryObject (ObjectNameInformation)' Kernel Pool Memo
- [dos] Microsoft Edge Chakra JIT - 'RegexHelper::StringReplace' Must Call the Callback
- [dos] Microsoft Edge Chakra JIT - Incorrect GenerateBailOut Calling Patterns
- [dos] Microsoft Windows 10 - WLDP/MSHTML CLSID UMCI Bypass
- [remote] Apple iOS 10.2 (14C92) - Remote Code Execution
- [dos] Microsoft Excel - OLE Arbitrary Code Execution
- [dos] Microsoft Office Groove - 'Workspace Shortcut' Arbitrary Code Execution
- [shellcode] Windows x64 - API Hooking Shellcode (117 bytes)
- [webapps] 3CX Phone System 15.5.3554.1 - Directory Traversal
- [webapps] Trend Micro Data Loss Prevention Virtual Appliance 5.2 - Path Traversal
- [webapps] Webmin 1.850 - Multiple Vulnerabilities
- [webapps] AlienVault Unified Security Management (USM) 5.4.2 - Cross-Site Request For
- [webapps] phpMyFAQ 2.9.8 - Cross-Site Scripting
- [webapps] Dreambox Plugin BouquetEditor - Cross-Site Scripting
- [webapps] TYPO3 Extension Restler 1.7.0 - Local File Disclosure
- [remote] Sync Breeze Enterprise 10.1.16 - Buffer Overflow (SEH) (Metasploit)
- [webapps] E-Sic Software livre CMS - Cross Site Scripting
- [webapps] E-Sic Software livre CMS - 'f' Parameter SQL Injection
- [webapps] E-Sic Software livre CMS - 'cpfcnpj' Parameter SQL Injection
- [webapps] E-Sic Software livre CMS - Autentication Bypass
- [webapps] E-Sic Software livre CMS - 'q' Parameter SQL Injection
- [webapps] OctoberCMS 1.0.425 (Build 425) - Cross-Site Scripting
- [shellcode] Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (30 bytes)
- [dos] binutils 2.29.51.20170921 - 'read_1_byte' Heap-Based Buffer Overflow
- [local] ASX to MP3 3.1.3.7 - '.m3u' Buffer Overflow
- [remote] VX Search Enterprise 10.1.12 - Buffer Overflow
- [webapps] Trend Micro InterScan Messaging Security (Virtual Appliance) - Remote Code
- [webapps] Trend Micro OfficeScan 11.0/XG (12.0) - Remote Code Execution (Metasploit)
- [local] ASX to MP3 converter < 3.1.3.7 - Stack Overflow (DEP Bypass)
- [dos] IBM Notes 8.5.x/9.0.x - Denial of Service (Metasploit)
- [webapps] Complain Management System - Hard-Coded Credentials / Blind SQL injection
- [webapps] ClipShare 7.0 - SQL Injection
- [webapps] Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload B
- [remote] OrientDB 2.2.2 - 2.2.22 - Remote Code Execution (Metasploit)
- [remote] Rancher Server - Docker Daemon Code Execution (Metasploit)
- [dos] PyroBatchFTP 3.17 - Buffer Overflow (SEH)
- [webapps] Metasploit < 4.14.1-20170828 - Cross-Site Request Forgery
- [local] Microsoft Windows 10 x64 RS2 - 'win32kfull!bFill' Pool Overflow
- [webapps] Unitrends UEB 9.1 - Privilege Escalation
- [remote] Unitrends UEB 9.1 - Authentication Bypass / Remote Command Execution
- [remote] Unitrends UEB 9.1 - 'Unitrends bpserverd' Remote Command Execution
- [webapps] NETGEAR ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution
- [dos] WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (2)
- [webapps] ClipBucket 2.8.3 - Remote Code Execution
- [webapps] Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload B
- [remote] ERS Data System 1.8.1 - Java Deserialization
- [local] DiskBoss Enterprise 8.4.16 - Local Buffer Overflow
- [webapps] EPESI 1.8.2 rev20170830 - Cross-Site Scripting
- [remote] UCOPIA Wireless Appliance < 5.1 (Captive Portal) - Unauthenticated Root Remo
- [local] Apple Mac OS X + Safari - Local Javascript Quarantine Bypass
- [local] Microsoft Word 2007 (x86) - Information Disclosure
- [webapps] Fiberhome AN5506-04-F - Command Injection
- [dos] Dnsmasq < 2.78 - Integer Underflow
- [dos] Dnsmasq < 2.78 - Lack of free() Denial of Service
- [dos] Dnsmasq < 2.78 - Information Leak
- [dos] Dnsmasq < 2.78 - Stack-Based Overflow
- [dos] Dnsmasq < 2.78 - Heap-Based Overflow
- [dos] Dnsmasq < 2.78 - 2-byte Heap-Based Overflow
- [webapps] OpenText Document Sciences xPression 4.5SP1 Patch 13 - 'documentId' SQL Inj
- [webapps] OpenText Document Sciences xPression 4.5SP1 Patch 13 - 'jobRunId' SQL Injec
- [remote] Qmail SMTP - Bash Environment Variable Injection (Metasploit)
- [local] UCOPIA Wireless Appliance < 5.1.8 - Restricted Shell Escape
- [local] UCOPIA Wireless Appliance < 5.1.8 - Privilege Escalation
- [webapps] phpCollab 2.5.1 - SQL Injection
- [webapps] phpCollab 2.5.1 - Arbitrary File Upload
- [webapps] NPM-V (Network Power Manager) 2.4.1 - Password Reset
- [dos] Linux Kernel < 4.14.rc3 - Local Denial of Service