- [dos] WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
- [dos] WebKit - 'WebCore::Node::getFlag' Use-After-Free
- [dos] WebKit - 'WebCore::getCachedWrapper' Use-After-Free
- [local] Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
- [remote] IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
- [remote] VICIdial 2.9 RC 1 to 2.13 RC1 - user_authorization Unauthenticated Command E
- [webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
- [webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
- [dos] WebKit JSC - 'DFG::ByteCodeParser::flush(InlineStackEntry* inlineStackEntry)' I
- [dos] WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference
- [dos] WebKit JSC - 'JSArray::appendMemcpy' Uninitialized Memory Copy
- [dos] WebKit JSC - 'ArgumentsEliminationPhase::transform' Incorrect LoadVarargs Handl
- [webapps] Barracuda Load Balancer Firmware
- [webapps] Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Meta
- [remote] Belkin NetCam F7D7601 - Multiple Vulnerabilities
- [webapps] Orangescrum 1.6.1 - Multiple Vulnerabilities
- [papers] How to exploit ETERNALROMANCE/SYNERGY on Windows Server 2016
- [remote] FTPGetter 5.89.0.85 - Buffer Overflow (SEH)
- [remote] Firefox 50.0.1 - ASM.JS JIT-Spray Remote Code Execution
- [webapps] WDTV Live SMP 2.03.20 - Remote Password Reset
- [local] Counter Strike: Condition Zero - '.BSP' Map File Code Execution
- [webapps] Apache Struts 2.3.x Showcase - Remote Code Execution (PoC)
- [webapps] DataTaker DT80 dEX 1.50.012 - Information Disclosure
- [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Configuration Download
- [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Privilege Escalation
- [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Cross-Site Request Forger
- [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass
- [papers] Hidden Network: Detecting Hidden Networks created with USB Devices
- [remote] Skype for Business 2016 - Cross-Site Scripting
- [remote] Microsoft Windows Windows 7/8.1/2008 R2/2012 R2/2016 R2 - 'EternalBlue' SMB
- [webapps] NfSen
- [webapps] Pelco VideoXpert 1.12.105 - Information Disclosure
- [webapps] Pelco VideoXpert 1.12.105 - Directory Traversal
- [local] Pelco VideoXpert 1.12.105 - Privilege Escalation
- [webapps] Pelco Sarix/Spectra Cameras - Remote Code Execution
- [webapps] Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery (Enable SSH Root A
- [webapps] Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scrip
- [remote] NfSen
- [local] NfSen < 1.3.7 / AlienVault OSSIM < 5.3.6 - Privilege Escalation
- [remote] Easy File Sharing Web Server 7.2 - GET HTTP Request 'PassWD' Buffer Overflow
- [remote] Yaws 1.91 - Remote File Disclosure
- [dos] Firefox 54.0.1 - Denial of Service
- [dos] LibTIFF - '_TIFFVGetField (tiffsplit)' Out-of-Bounds Read
- [dos] LibTIFF - 'tif_jbig.c' Denial of Service
- [dos] LibTIFF - 'tif_dirwrite.c' Denial of Service
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [webapps] BOA Web Server 0.94.14rc21 - Arbitrary File Access
- [remote] BestSafe Browser - MITM Remote Code Execution
- [remote] eVestigator Forensic PenTester - MITM Remote Code Execution
- [dos] Google Chrome - Out-of-Bounds Access in RegExp Stubs
- [dos] LG MRA58K - 'ASFParser::SetMetaData' Stack Overflow
- [webapps] Humax HG100R 2.0.6 - Backup File Download
- [remote] ActiveMQ < 5.14.0 - Web Shell Upload (Metasploit)
- [remote] Veritas/Symantec Backup Exec - SSL NDMP Connection Use-After-Free (Metasploi
- [papers] [Spanish] How to Exploit ETERNALBLUE on Windows Server 2012 R2
- [papers] How to Exploit ETERNALBLUE on Windows Server 2012 R2
- [dos] FreeBSD - 'setrlimit' Stack Clash (PoC)
- [dos] FreeBSD - 'FGPE' Stack Clash (PoC)
- [dos] FreeBSD - 'FGPU' Stack Clash (PoC)
- [local] Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) -
- [local] Linux Kernel (Debian 7.7/8.5/9.0 / Ubuntu 14.04.2/16.04.2/17.04 / Fedora 22/2
- [local] Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2
- [local] Linux Kernel - 'offset2lib' 'Stack Clash' Exploit
- [dos] NetBSD - 'Stack Clash' (PoC)
- [local] OpenBSD - 'at' Local Privilege Escalation 'Stack Clash' Exploit
- [local] Oracle Solaris 11.1/11.3 (RSH) - Local Privilege Escalation 'Stack Clash' Exp
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
- [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone