- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [remote] Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [local] BIND 9.10.5 - Unquoted Service Path Privilege Escalation
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
- [dos] reiserfstune 3.6.25 - Local Buffer Overflow
- [papers] Of Mice and Keyboards - On the Security of Modern Wireless Desktop Sets
- [papers] [Hebrew] Digital Whisper Security Magazine #83
- [webapps] WebKit - 'Document::prepareForDestruction' and 'CachedFrame' Universal Cros
- [dos] WebKit - 'Element::setAttributeNodeNS' Use-After-Free
- [webapps] WebKit - 'CachedFrameBase::restore' Universal Cross-Site Scripting
- [webapps] WebKit - CachedFrame does not Detach Openers Universal Cross-Site Scripting
- [dos] WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContext
- [dos] WebKit JSC - 'JSObject::ensureLength' ensureLengthSlow Check Failure
- [papers] [Hebrew] Digital Whisper Security Magazine #83
- [webapps] Riverbed SteelHead VCX 9.6.0a - Arbitrary File Read
- [papers] [Hebrew] Digital Whisper Security Magazine #82
- [webapps] Piwigo Plugin Facetag 0.0.3 - Cross-Site Scripting
- [webapps] OV3 Online Administration 3.0 - SQL Injection
- [webapps] OV3 Online Administration 3.0 - Remote Code Execution
- [webapps] OV3 Online Administration 3.0 - Directory Traversal
- [webapps] Piwigo Plugin Facetag 0.0.3 - SQL Injection
- [webapps] IBM Informix Dynamic Server / Informix Open Admin Tool - DLL Injection / Re
- [webapps] KEMP LoadMaster 7.135.0.13245 - Persistent Cross-Site Scripting / Remote Co
- [dos] Microsoft MsMpEng - Remotely Exploitable Use-After-Free due to Design Issue in
- [webapps] TerraMaster F2-420 NAS TOS 3.0.30 - Unauthenticated Remote Code Execution a
- [dos] Microsoft MsMpEng - Use-After-Free via Saved Callers
- [webapps] Trend Micro Deep Security version 6.5 - XML External Entity Injection / Loc
- [local] TiEmu 2.08 - Local Buffer Overflow
- [webapps] uc-http Daemon - Local File Inclusion / Directory Traversal
- [webapps] WebInfopedia File Downloader - Arbitrary File Disclosure
- [dos] Microsoft MsMpEng - Multiple Crashes While Scanning Malformed Files
- [webapps] WordPress Plugin Huge-IT Video Gallery 2.0.4 - SQL Injection
- [remote] Octopus Deploy - Authenticated Code Execution (Metasploit)
- [remote] Samba - is_known_pipename() Arbitrary Module Load (Metasploit)
- [papers] Mobile Penetration Testing
- [remote] CERIO DT-100G-N/DT-300N/CW-300N - Multiple Vulnerabilities
- [remote] Google Chrome 60.0.3080.5 V8 JavaScript Engine - Out-of-Bounds Write
- [local] Microsoft MsMpEng - Multiple Problems Handling ntdll!NtControlChannel Command
- [webapps] D-Link DCS Series Cameras - Insecure Crossdomain
- [webapps] QWR-1104 Wireless-N Router - Cross-Site Scripting
- [local] JAD java Decompiler 1.5.8e - Local Buffer Overflow
- [dos] Sandboxie 5.18 - Local Denial of Service
- [dos] Mozilla Firefox < 53 - 'ConvolvePixel' Memory Disclosure
- [dos] Mozilla Firefox < 53 - 'gfxTextRun' Out-of-Bounds Read
- [dos] Skia Graphics Library - Heap Overflow due to Rounding Error in SkEdge::setLine
- [dos] Apple WebKit / Safari 10.0.3(12602.4.8) - 'WebCore::FrameView::scheduleRelayout
- [webapps] Apple WebKit / Safari 10.0.3(12602.4.8) - 'Editor::Command::execute' Univer
- [webapps] WebKit - 'ContainerNode::parserRemoveChild' Universal Cross-Site Scripting
- [webapps] WebKit - 'ContainerNode::parserInsertBefore' Universal Cross-Site Scripting
- [webapps] WebKit - enqueuePageshowEvent and enqueuePopstateEvent Universal Cross-Site
- [webapps] WebKit - Stealing Variables via Page Navigation in FrameLoader::clear
- [webapps] Apple Safari 10.0.3(12602.4.8) / WebKit - 'HTMLObjectElement::updateWidget'
- [remote] Samba 3.5.0 - Remote code execution
- [papers] Introduction to Manual Backdooring
- [local] Dup Scout Enterprise 9.7.18 - '.xml' Local Buffer Overflow
- [webapps] NetGain EM 7.2.647 build 941 - Authentication Bypass / Local File Inclusion
- [dos] Apple iOS/macOS - Memory Corruption Due to Bad Bounds Checking in NSCharacterSe
- [dos] Apple macOS - Local Privilege Escalation Due to Lack of Bounds Checking in HISe
- [dos] Apple iOS/macOS Kernel - Use-After-Free Due to Bad Locking in Unix Domain Socke
- [dos] Apple iOS/macOS Kernel - Memory Disclosure Due to Lack of Bounds Checking in ne
- [remote] VX Search Enterprise 9.5.12 - GET Buffer Overflow (Metasploit)
- [local] KDE 4/5 - 'KAuth' Privilege Escalation
- [dos] Apple iOS/macOS - NSKeyedArchiver Memory Corruption Due to Lack of Bounds Check
- [dos] Apple iOS/macOS - NSKeyedArchiver Heap Corruption Due to Rounding Error in 'TIK
- [dos] Apple iOS/macOS - NSUnarchiver Heap Corruption Due to Lack of Bounds Checking i
- [dos] Apple macOS - '32-bit syscall exit' Kernel Register Leak
- [local] VMware Workstation for Linux 12.5.2 build-4638234 - ALSA Config Host Root Pri
- [dos] Sure Thing Disc Labeler 6.2.138.0 - Buffer Overflow (PoC)
- [remote] Secure Auditor 3.0 - Directory Traversal
- [webapps] KMCIS CaseAware - Cross-Site Scripting
- [webapps] Mantis Bug Tracker 1.3.10/2.3.0 - Cross-Site Request Forgery
- [webapps] PlaySMs 1.4 - 'import.php' Remote Code Execution
- [webapps] D-Link DIR-600M Wireless N 150 - Authentication Bypass
- [webapps] PlaySMS 1.4 - Remote Code Execution
- [webapps] ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass
- [webapps] SAP Business One for Android 1.2.3 - XML External Entity Injection
- [webapps] Belden Garrettcom 6K/10K Switches - Authentication Bypass / Memory Corrupti
- [webapps] Oracle PeopleSoft - Server-Side Request Forgery
- [webapps] Joomla 3.7.0 - 'com_fields' SQL Injection
- [remote] Microsoft Windows Windows 7/2008 R2 (x64) - 'EternalBlue' SMB Remote Code Ex
- [remote] Microsoft Windows Windows 8/2012 R2 (x64) - 'EternalBlue' SMB Remote Code Ex
- [webapps] INFOR EAM 11.0 Build 201410 - Persistent Cross-Site Scripting via Comment F
- [webapps] INFOR EAM 11.0 Build 201410 - 'filtervalue' SQL Injection
- [dos] Mozilla Firefox 50 - 55 - Stack Overflow Denial of Service
- [remote] Oracle PeopleSoft - XML External Entity to SYSTEM Remote Code Execution
- [remote] BuilderEngine 3.5.0 - Arbitrary File Upload and Execution (Metasploit)
- [remote] WordPress PHPMailer 4.6 - Host Header Command Injection (Metasploit)
- [remote] Serviio Media Server - checkStreamUrl Command Execution (Metasploit)
- [remote] Dup Scout Enterprise 9.5.14 - GET Buffer Overflow (Metasploit)
- [dos] Microsoft Windows - Running Object Table Register ROTFLAGS_ALLOWANYCLIENT Privi
- [local] Microsoft Windows - COM Aggregate Marshaler/IRemUnknown2 Type Confusion Privi
- [dos] Adobe Flash - Out-of-Bounds Read in Getting TextField Width
- [dos] Adobe Flash - Margin Handling Heap Corruption
- [dos] Adobe Flash - AVC Deblocking Out-of-Bounds Read
- [shellcode] Windows x32 / Windows x64 - cmd.exe Shellcode (718 bytes)
- [papers] Stealing Windows Credentials Using Google Chrome
- [dos] Apple iOS < 10.3.2 - Notifications API Denial of Service
- [webapps] Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Mult
- [webapps] Sophos Web Appliance 4.3.1.1 - Session Fixation
- [remote] LabF nfsAxe 3.7 FTP Client - Buffer Overflow (SEH)
- [dos] Microsoft Windows 7 Kernel - Pool-Based Out-of-Bounds Reads Due to bind() Imple
- [remote] Quest Privilege Manager - pmmasterd Buffer Overflow (Metasploit)
- [dos] Microsoft Windows 7 Kernel - 'win32k!xxxClientLpkDrawTextEx' Stack Memory Discl
- [dos] Microsoft Windows 7 Kernel - Uninitialized Memory in the Default dacl Descripto
- [dos] Microsoft Windows 10 Kernel - nt!NtTraceControl (EtwpSetProviderTraits) Pool Me
- [dos] Larson VizEx Reader 9.7.5 - Local Buffer Overflow (SEH)
- [dos] Halliburton LogView Pro 10.0.1 - Local Buffer Overflow (SEH)
- [webapps] PlaySms 1.4 - Remote Code Execution
- [webapps] Mailcow 0.14 - Cross-Site Request Forgery
- [webapps] Admidio 3.2.8 - Cross-Site Request Forgery
- [local] Linux Kernel 3.x (Ubuntu 14.04 / Mint 17.3 / Fedora 22) - Double-free usb-mid
- [local] Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' & 'SO_RCVBUFFORCE' Local Privile
- [remote] Vanilla Forums < 2.3 - Remote Code Execution
- [webapps] CMS Made Simple 2.1.6 - Multiple Vulnerabilities
- [local] Linux Kernel 4.8.0 - Packet Socket Local root Privilege Escalation
- [dos] OpenVPN 2.4.0 - Unauthenticated Denial of Service
- [remote] Microsoft IIS WebDav - ScStoragePathFromUrl Overflow (Metasploit)
- [dos] SAP SAPCAR 721.510 - Heap-Based Buffer Overflow
- [webapps] Gongwalker API Manager 1.1 - Cross-Site Request Forgery
- [remote] Microsoft Windows - SrvOs2FeaToNt SMB Remote Code Execution (MS17-010)
- [webapps] BanManager WebUI 1.5.8 - PHP Code Injection
- [webapps] QNAP PhotoStation 5.2.4 / MusicStation 4.8.4 - Authentication Bypass
- [webapps] LogRhythm Network Monitor - Authentication Bypass / Command Injection
- [dos] wolfSSL 3.10.2 - x509 Certificate Text Parsing Off-by-One
- [dos] LG G4 MRA58K - 'mkvparser::Block::Block' Heap Buffer Overflows
- [dos] LG G4 MRA58K - 'liblg_parser_mkv.so' Bad Allocation Calls
- [remote] Crypttech CryptoLog - Remote Code Execution (Metasploit)
- [webapps] I, Librarian 4.6 / 4.7 - Command Injection / Server Side Request Forgery /
- [remote] Oracle GoldenGate 12.1.2.0.0 - Unauthenticated Remote Code Execution
- [remote] Microsoft Windows 8 / 8.1 / 10 / Windows Server / SCEP, Microsoft Security E
- [local] Gemalto SmartDiag Diagnosis Tool < 2.5 - Buffer Overflow (SEH)
- [local] Xen 64bit PV Guest - pagetable use-after-type-change Breakout
- [dos] RPCBind / libtirpc - Denial of Service
- [shellcode] Linux/x86 - Disable ASLR Shellcode (80 bytes)
- [shellcode] Linux/x86-64 - Reverse Shell Shellcode (IPv6) (113 bytes)
- [webapps] ViMbAdmin 3.0.15 - Multiple Cross-Site Request Forgery
- [webapps] WordPress Plugin WebDorado Gallery 1.3.29 - SQL Injection
- [dos] CloudBees Jenkins 2.32.1 - Java Deserialization
- [remote] Safari 10.0.3 - 'JSC::CachedCall' Use-After-Free
- [webapps] WordPress < 4.7.4 - Unauthorized Password Reset
- [webapps] WordPress 4.6 - Unauthenticated Remote Code Execution
- [webapps] Serviio PRO 1.8 DLNA Media Streaming Server - REST API Arbitrary Code Execu
- [webapps] Serviio PRO 1.8 DLNA Media Streaming Server - REST API Arbitrary Password C
- [webapps] Serviio PRO 1.8 DLNA Media Streaming Server - REST API Information Disclosu
- [local] Serviio PRO 1.8 DLNA Media Streaming Server - Local Privilege Escalation
- [dos] Internet Explorer 11 - CMarkup::DestroySplayTree Use-After-Free
- [papers] BluedIoT: When a mature and immature technology mixes, becomes an “idiot” si
- [local] Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit)
- [webapps] Tuleap Project Wiki 8.3
- [local] HideMyAss Pro VPN Client for macOS 3.x - Privilege Escalation
- [local] HideMyAss Pro VPN Client for OS X 2.2.7.0 - Privilege Escalation
- [webapps] Alerton Webtalk 2.5 / 3.3 - Multiple Vulnerabilities
- [dos] MySQL
- [dos] IrfanView 4.44 - Denial of Service
- [dos] Panda Free Antivirus - 'PSKMAD.sys' Denial of Service
- [webapps] Emby MediaServer 3.2.5 - Password Reset
- [webapps] Emby MediaServer 3.2.5 - SQL Injection
- [webapps] Emby MediaServer 3.2.5 - Directory Traversal
- [webapps] Easy File Uploader - Arbitrary File Upload
- [webapps] Simple File Uploader - Arbitrary File Download
- [dos] Microsoft Internet Explorer 11.576.14393.0 - 'CStyleSheetArray::BuildListOfMatc
- [remote] Mercurial - Custom hg-ssh Wrapper Remote Code Exec (Metasploit)
- [webapps] TYPO3 News Module - SQL Injection
- [webapps] Revive Ad Server 4.0.1 - Cross-Site Scripting / Cross-Site Request Forgery
- [papers] Local File Disclosure using SQL Injection
- [papers] HackBack - A DIY Guide (Spanish)
- [papers] HackBack - A DIY Guide for those without the patience to wait for whistleblo
- [papers] HackBack - A DIY Guide
- [webapps] October CMS 1.0.412 - Multiple Vulnerabilities
- [local] Realtek Audio Driver 6.0.1.7898 (Windows 10) - Dolby Audio X2 Service Privile
- [webapps] OpenText Documentum Content Server - dm_bp_transition.ebs docbase Method Ar
- [remote] Microsoft Windows 2003 SP2 - SMB Remote Code Execution (ERRATICGOPHER)
- [dos] Apple Safari - Array concat Memory Corruption
- [webapps] Joomla Component Myportfolio 3.0.2 - 'pid' Parameter SQL Injection
- [dos] Oracle VirtualBox Guest Additions 5.1.18 - Unprivileged Windows User-Mode Gues
- [remote] WePresent WiPG-1000 - Command Injection (Metasploit)
- [remote] Microsoft Office Word - Malicious Hta Execution (Metasploit)
- [webapps] HPE OpenCall Media Platform (OCMP) 4.3.2 - Cross-Site Scripting / Remote Fi
- [webapps] FlySpray 1.0-rc4 - Cross-Site Scripting / Cross-Site Request Forgery
- [webapps] WordPress Plugin Car Rental System 2.5 - SQL Injection
- [webapps] WordPress Plugin KittyCatfish 2.2 - SQL Injection
- [webapps] WordPress Plugin Wow Viral Signups 2.1 - SQL Injection
- [webapps] Oracle E-Business Suite 12.2.3 - 'IESFOOTPRINT' SQL Injection
- [webapps] WordPress Plugin Wow Forms 2.1 - SQL Injection
- [local] Ubuntu 16.10 / 16.04 LTS - LightDM Guest Account Local Privilege Escalation
- [papers] nt!_SEP_TOKEN_PRIVILEGES - Single Write EoP Protect
- [webapps] Oracle PeopleSoft - 'PeopleSoftServiceListeningConnector' XML External Enti
- [dos] - PrivateTunnel Client 2.8 - Local Buffer Overflow (SEH)
- [local] - Dell Customer Connect 1.3.28.0 - Privilege Escalation
- [papers] - Flexispy
- [remote] - SquirrelMail < 1.4.22 - Remote Code Execution
- [shellcode] - Linux/x86 - Egg-hunter Shellcode (18 bytes)
- [local] - VirtualBox 5.0.32 r112930 x64 - Windows Process COM Injection Privilege Esc
- [local] - VirtualBox 5.1.14 r112924 - Unprivileged Host User to Host Kernel Privilege
- [dos] - VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Priv
- [dos] - VirtualBox - 'virtio-net' Guest-to-Host Out-of-Bounds Write
- [local] - VirtualBox - Guest-to-Host Privilege Escalation via Broken Length Handling
- [remote] - Microsoft Windows - ManagementObject Arbitrary .NET Serialization Remote C
- [local] - Microsoft Windows 10 - Runtime Broker ClipboardBroker Privilege Escalation
- [local] - Microsoft Windows 10 10586 - IEETWCollector Arbitrary Directory/File Deleti
- [webapps] - Apple WebKit / Safari 10.0.2(12602.3.12.0.1) - 'operationSpreadGeneric' U
- [webapps] - Apple WebKit / Safari 10.0.2(12602.3.12.0.1) - 'PrototypeMap::createEmpty
- [papers] - [Spanish] How to Exploit ETERNALBLUE and DOUBLEPULSAR on Windows 7/2008
- [papers] - How to Exploit ETERNALBLUE and DOUBLEPULSAR on Windows 7/2008
- [remote] - Huawei HG532n - Command Injection (Metasploit)
- [remote] - Microsoft Word - .RTF Remote Code Execution
- [dos] - pinfo 0.6.9 - Local Buffer Overflow
- [remote] - Tenable Appliance < 4.5 - Unauthenticated Remote Root Code Execution
- [dos] - Microsoft Windows - Uncredentialed SMB RCE (MS17-010) (Metasploit)
- [dos] - WinSCP 5.9.4 - 'LIST' Denial of Service (Metasploit)
- [webapps] - Mantis Bug Tracker 1.3.0/2.3.0 - Password Reset
- [papers] - Web Services Penetration Testing
- [local] - VirusChaser 8.0 - Buffer Overflow (SEH)
- [local] - Linux Kernel 4.8.0 UDEV < 232 - Privilege Escalation
- [webapps] - Concrete5 8.1.0 - 'Host' Header Injection
- [shellcode] - Linux/x86-64 - execve("/bin/sh") Shellcode (31 bytes)