- [remote] - DiskBoss Enterprise - GET Buffer Overflow (Metasploit)
- [webapps] - Image Sharing Script 4.13 - Multiple Vulnerabilities
- [remote] - WinaXe Plus 8.7 - Buffer Overflow
- [shellcode] - Windows x64 - CreateRemoteThread() DLL Injection Shellcode (584 bytes)
- [webapps] - 9 Network Linkedin Clone Script - Improper Access Restrictions
- [webapps] - Article Directory Script Seo 3.2 - Improper Access Restrictions
- [webapps] - e-Soft24 Jokes Portal Script Seo 1.3 - Authentication Bypass
- [webapps] - MC Smart Shop Script - SQL Injection
- [webapps] - MC Buy and Sell Cars Script 1.1 - SQL Injection
- [webapps] - MC Yellow Pages Script - SQL Injection
- [webapps] - MC Real Estate Pro Script - Improper Access Restrictions
- [webapps] - MC Hosting Coupons Script - Cross-Site Request Forgery
- [webapps] - MC Inventory Manager Script - Multiple Vulnerabilities
- [webapps] - MC Coming Soon Script - Arbitrary File Upload / Improper Access Restricti
- [webapps] - My Private Tutor Website Script - Authentication Bypass
- [webapps] - Hindu Matrimonial Script - Authentication Bypass
- [webapps] - Just Dial Marketplace Script - Authentication Bypass
- [webapps] - Entrepreneur Matrimonial Script - Authentication Bypass
- [webapps] - Open Source Real-Estate Script - SQL Injection
- [webapps] - Inout StickBoard 1.0 Script - Improper Access Restrictions
- [webapps] - Inout Search Engine Ultimate Edition 7.0/8.0 Script - Improper Access Res
- [dos] - Mozilla Firefox < 50.1.0 - Use After Free
- [remote] - Cisco Firepower Management Console 6.0 - Post Authentication UserAdd
- [webapps] - Zeroshell 3.6.0/3.7.0 Net Services - Remote Code Execution
- [local] - aSc Timetables 2017 - Buffer Overflow
- [webapps] - Airbnb Clone Script - Arbitrary File Upload
- [webapps] - School Management Software 2.75 - SQL Injection
- [webapps] - Penny Auction Script - Arbitrary File Upload
- [webapps] - ECommerce-TIBSECART - Arbitrary File Upload
- [webapps] - ECommerce-Multi-Vendor Software - Arbitrary File Upload
- [webapps] - Job Portal Script 9.11 - Authentication Bypass
- [webapps] - Online Food Delivery 2.04 - Authentication Bypass
- [webapps] - Dating Script 3.25 - SQL Injection
- [webapps] - Travel Portal Script 9.33 - SQL Injection
- [webapps] - Movie Portal Script 7.35 - SQL Injection
- [dos] - Boxoft Wav 1.0 - Buffer Overflow
- [papers] - OpenSSL - Weak KDF
- [webapps] - Starting Page 1.3 - 'category' Parameter SQL Injection
- [webapps] - My link trader 1.1 - 'id' Parameter SQL Injection
- [dos] - Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corrupti
- [dos] - Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corrupti
- [webapps] - WordPress Plugin WP Support Plus Responsive Ticket System 7.1.3 - Privile
- [webapps] - FMyLife Clone Script (Pro Edition) 1.1 - Cross-Site Request Forgery (Add
- [webapps] - Starting Page 1.3 - SQL Injection
- [remote] - DiskBoss Enterprise 7.5.12 - 'POST' Buffer Overflow (SEH)
- [webapps] - Friends in War Make or Break 1.7 - 'imgid' Parameter SQL Injection
- [webapps] - My Php Dating 2.0 - 'id' Parameter SQL Injection
- [webapps] - My Php Dating 2.0 - SQL Injection
- [webapps] - Splunk 6.1.1 - 'Referer' Header Cross-Site Scripting
- [webapps] - My Link Trader 1.1 - Authentication Bypass
- [local] - Advanced Desktop Locker 6.0.0 - Lock Screen Bypass
- [webapps] - DirectAdmin 1.50.1 - Denial of Service
- [dos] - Brave Browser 1.2.16/1.9.56 - Address Bar URL Spoofing
- [dos] - Google Android max86902 Driver - 'sysfs' Interfaces Race Condition
- [papers] - Web App Penetration Testing - Local File Inclusion (LFI)
- [remote] - Microsoft Windows 10 Edge - 'chakra.dll' Info Leak / Type Confusion Remote
- [webapps] - Atlassian Confluence Jira 5.9.12 - Persistent Cross-Site Scripting
- [local] - Kaspersky 17.0.0 - Local CA root is Incorrectly Protected
- [webapps] - My Click Counter 1.0 - Authentication Bypass
- [webapps] - PHPMailer < 5.2.20 / SwiftMailer
- [dos] - QNAP NAS Devices - Heap Overflow
- [remote] - Internet Download Accelerator 6.10.1.1527 - FTP Buffer Overflow (SEH)
- [papers] - [Hebrew] Digital Whisper Security Magazine #79
- [shellcode] - Windows x64 - Password Protected Bind Shellcode (825 bytes)
- [webapps] - Zend Framework / zend-mail < 2.4.11 - Remote Code Execution
- [webapps] - WordPress Plugin Slider Templatic Tevolution
- [webapps] - Dell SonicWALL Global Management System GMS 8.1 - Blind SQL Injection
- [webapps] - Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cros
- [local] - Android - get_user/put_user Exploit (Metasploit)
- [webapps] - Joomla! Component aWeb Cart Watching System for Virtuemart 2.6.0 - SQL In
- [webapps] - PHPMailer < 5.2.18 - Remote Code Execution (Python)
- [webapps] - SwiftMailer < 5.4.5-DEV - Remote Code Execution
- [webapps] - WordPress Plugin Simply Poll 1.4.1 - SQL Injection
- [webapps] - PHPMailer < 5.2.20 - Remote Code Execution
- [webapps] - PHPMailer < 5.2.18 - Remote Code Execution (PHP)
- [webapps] - PHPMailer 5.2.17 - Remote Code Execution
- [local] - Wampserver 3.0.6 - Insecure File Permissions Privilege Escalation
- [dos] - FTPShell Server 6.36 - '.csv' Local Denial of Service
- [webapps] - Joomla! Component Blog Calendar - SQL Injection
- [dos] - XAMPP Control Panel - Denial Of Service
- [local] - OpenSSH < 7.4 - 'UsePrivilegeSeparation Disabled' Forwarded Unix Domain Soc
- [remote] - OpenSSH < 7.4 - agent Protocol Arbitrary Library Loading
- [webapps] - Apache mod_session_crypto - Padding Oracle
- [dos] - Microsoft Internet Explorer 11 MSHTML - CPaste*Command::Convert*Bitmapto*Png
- [local] - Vesta Control Panel 0.9.8-16 - Local Privilege Escalation
- [dos] - MacOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free
- [dos] - MacOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to
- [local] - MacOS < 10.12.2 / iOS < 10.2 Kernel - _kernelrpc_mach_port_insert_right_tra
- [local] - MacOS < 10.12.2 / iOS < 10.2 - Broken Kernel Mach Port Name uref Handling P
- [dos] - MacOS 10.12.1 / iOS < 10.2 - powerd Arbitrary Port Replacement
- [dos] - MacOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement
- [dos] - MacOS Kernel 10.12.1 - Writable Privileged IOKit Registry Properties Code Exe
- [local] - IBM AIX 6.1/7.1/7.2 - 'Bellmail' Privilege Escalation
- [remote] - NETGEAR WNR2000v5 - Remote Code Execution
- [dos] - Microsoft Edge - SIMD.toLocaleString Uninitialized Memory (MS16-145)
- [dos] - Microsoft Edge - Internationalization Initialization Type Confusion (MS16-144
- [dos] - Microsoft Internet Explorer 11 MSHTML - CSplice*Tree*Engine::Remove*Splice Us
- [dos] - Google Android - WifiNative::setHotlist Stack Overflow
- [webapps] - WordPress Plugin 404 Redirection Manager 1.0 - SQL Injection
- [dos] - Google Chrome < 31.0.1650.48 - HTTP 1xx base::String*Tokenizer*T::Quick*Get*N
- [local] - Naenara Browser 3.5 (RedStar 3.0 Desktop) - 'JACKRABBIT' Client-Side Comman
- [local] - RedStar 3.0 Server - 'BEAM & RSSMON' Command Execution (Shellshock)
- [shellcode] - Linux/x86 - /bin/bash -c Arbitrary Command Execution Shellcode (72 byte
- [dos] - Orthanc DICOM Server 1.1.0 - Memory Corruption
- [local] - iOS 10.1.1 / macOS 10.12 16A323 XNU Kernel - set_dp_control_port Lack of Lo
- [dos] - OsiriX DICOM Viewer 8.0.1 - Memory Corruption
- [dos] - ConQuest DICOM Server 1.4.17d - Stack Buffer Overflow
- [dos] - DCMTK 3.6.0 storescp - Stack Buffer Overflow
- [papers] - [Hebrew] Digital Whisper Security Magazine #75
- [local] - FortiClient SSLVPN 5.4 - Credentials Disclosure
- [dos] - PHP 7.0 - JsonSerializable::jsonSerialize json_encode Local Denial of Service
- [webapps] - ZKTeco ZKAccess Security System 5.3.1 - Persistent Cross-Site Scripting
- [webapps] - ZKTeco ZKBioSecurity 3.0 - (visLogin.jsp) Local Authorization Bypass
- [webapps] - ZKTeco ZKBioSecurity 3.0 - Directory Traversal
- [webapps] - ZKTeco ZKBioSecurity 3.0 - (Add Superadmin) Cross-Site Request Forgery
- [webapps] - ZKTeco ZKBioSecurity 3.0 - Hardcoded Credentials Remote SYSTEM Code Execu
- [local] - ZKTeco ZKAccess Professional 3.5.3 - Insecure File Permissions Privilege Es
- [local] - ZKTeco ZKTime.Net 3.0.1.6 - Insecure File Permissions Privilege Escalation
- [dos] - PHP 7.0 - AppendIterator::append Local Denial of Service
- [dos] - PHP 5.0.0 - snmpset() Local Denial of Service
- [dos] - PHP 5.0.0 - fbird_[p]connect() Local Denial of Service
- [dos] - PHP 5.0.0 - snmpwalkoid() Local Denial of Service
- [dos] - PHP 5.0.0 - html_doc_file() Local Denial of Service
- [dos] - PHP 5.0.0 - hw_docbyanchor() Local Denial of Service
- [dos] - PHP 5.0.0 - imap_mail() Local Denial of Service
- [webapps] - FreePBX 13.0.35 - SQL Injection
- [dos] - Adobe Flash - MovieClip Transform Getter Use-After-Free
- [dos] - Adobe Flash - Use-After-Free When Returning Rectangle
- [dos] - Adobe Flash - Stage.align Setter Use-After-Free
- [dos] - Adobe Flash - BitmapData.copyPixels Use-After-Free
- [dos] - Adobe Flash - Selection.setFocus Use-After-Free
- [webapps] - PLC Wireless Router GPN2.4P21-C-CN - Arbitrary File Disclosure
- [papers] - [Persian] Android Security and Forensic Science
- [webapps] - HelpDeskZ 1.0.2 - Unauthenticated Shell Upload
- [webapps] - INTELLINET IP Camera INT-L100M20N - Unauthorized admin Credential Change
- [dos] - PHP 7.0 - Object Cloning Local Denial of Service
- [dos] - PHP 5.0.0 - domxml_open_file() Local Denial of Service
- [local] - NScan 0.9.1 - (Target) Buffer Overflow
- [dos] - Goron Webserver 2.0 - Multiple Vulnerabilities
- [webapps] - FreePBX 13.0.35 - Remote Command Execution
- [remote] - Phoenix Exploit Kit - Remote Code Execution (Metasploit)
- [webapps] - chatNow - Multiple Vulnerabilities
- [webapps] - SimplePHPQuiz - Blind SQL Injection
- [dos] - Eye of Gnome 3.10.2 - GMarkup Out of Bounds Write
- [webapps] - WordPress Mail Masta Plugin 1.0 - Local File Inclusion
- [dos] - ObiHai ObiPhone 1032/1062 < 5-0-0-3497 - Multiple Vulnerabilities
- [webapps] - WordPress 4.5.3 - Directory Traversal / Denial of Service
- [papers] - Hunting HTML 5 postMessage Vulnerabilities
- [webapps] - Sakai 10.7 - Multiple Vulnerabilities
- [webapps] - VideoIQ Camera - Local File Disclosure
- [webapps] - Honeywell IP-Camera HICC-1100PT - Local File Disclosure
- [webapps] - JVC IP-Camera VN-T216VPRU - Local File Disclosure
- [webapps] - Vanderbilt IP-Camera CCPW3025-IR, CVMW3025-IR - Local File Disclosure
- [webapps] - Fortigate Firewalls - Remote Code Execution (EGREGIOUSBLUNDER)
- [remote] - TOPSEC Firewalls - Remote Exploit (ELIGIBLEBACHELOR)
- [webapps] - TOPSEC Firewalls - Remote Code Execution (ELIGIBLEBOMBSHELL)
- [webapps] - TOPSEC Firewalls - Remote Code Execution (ELIGIBLECANDIDATE)
- [webapps] - TOPSEC Firewalls - Remote Code Execution (ELIGIBLECONTESTANT)
- [local] - Cisco ASA / PIX - Privilege Escalation (EPICBANANA)
- [local] - WatchGuard Firewalls - ifconfig Privilege Escalation (ESCALATEPLOWMAN)
- [webapps] - tcPbX - (tcpbx_lang) Local File Inclusion
- [webapps] - MESSOA IP Cameras (Multiple Models) - Unauthenticated Password Change
- [webapps] - ZYCOO IP Phone System - Remote Command Execution
- [local] - Windows - Fileless UAC Protection Bypass Privilege Escalation (Metasploit)
- [webapps] - MESSOA IP-Camera NIC990 - Auth Bypass / Configuration Download
- [webapps] - TOSHIBA IP-Camera IK-WP41A - Auth Bypass / Configuration Download
- [webapps] - C2S DVR Management IRDOME-II-C2S, IRBOX-II-C2S, DVR - Credentials Disclos
- [webapps] - JVC IP-Camera VN-T216VPRU - Credentials Disclosure
- [webapps] - Vanderbilt IP-Camera CCPW3025-IR, CVMW3025-IR - Credentials Disclosure
- [webapps] - SIEMENS IP Cameras (Multiple Models) - Credential Disclosure / Configurat
- [remote] - Cisco ASA 8.X - Authentication Bypass (EXTRABACON)
- [webapps] - Honeywell IP-Camera HICC-1100PT - Credentials Disclosure
- [webapps] - SIEMENS IP Camera CCMW1025 x.2.2.1798 - Remote Admin Credentials Change
- [shellcode] - Windows x86 - InitiateSystemShutdownA() Shellcode (599 bytes)
- [dos] - Microsoft GDI+ - EMR_EXTTEXTOUTA and EMR_POLYTEXTOUTA Heap-Based Buffer Overf
- [webapps] - SIEMENS IP-Camera CVMS2025-IR, CCMS2025 - Credentials Disclosure
- [dos] - Internet Explorer - MSHTML!CMultiReadStreamLifetimeManager::ReleaseThr eadStat
- [webapps] - Nagios Incident Manager 2.0.0 - Multiple Vulnerabilities
- [webapps] - Nagios Network Analyzer 2.2.0 - Multiple Vulnerabilities
- [webapps] - Nagios Log Server 1.4.1 - Multiple Vulnerabilities
- [webapps] - Pi-Hole Web Interface 2.8.1 - Stored XSS in Whitelist/Blacklist
- [webapps] - Lepton CMS 2.2.0 / 2.2.1 - PHP Code Injection
- [webapps] - Lepton CMS 2.2.0 / 2.2.1 - Directory Traversal
- [shellcode] - Windows x86 - CreateProcessA cmd.exe Shellcode (253 bytes)
- [shellcode] - Windows x86 - MessageBoxA Shellcode (242 bytes)
- [papers] - [Turkish] Drupal Coder Vulnerability Analysis & MSF Module Dev
- [dos] - Google Chrome 26.0.1410.43 (Webkit) - OBJECT Element Use After Free PoC
- [webapps] - WSO2 Carbon 4.4.5 - (Denial of Service) CSRF
- [webapps] - WSO2 Carbon 4.4.5 - Stored XSS
- [webapps] - WSO2 Carbon 4.4.5 - Local File Inclusion
- [webapps] - WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities
- [dos] - Microsoft Office Word 2013,2016 - sprmSdyaTop Denial of Service (MS16-099)
- [webapps] - Zabbix 2.2.x, 3.0.x - SQL Injection
- [webapps] - GitLab - "impersonate" Feature Privilege Escalation
- [remote] - Samsung Smart Home Camera SNH-P-6410 - Command Injection
- [remote] - Easy FTP Server - "APPE" Command Buffer Overflow Remote Exploit
- [remote] - Apache + PHP < 5.3.12 / < 5.4.2 - Remote Code Execution (Multithreaded Sca
- [webapps] - FreePBX 13 / 14 - Remote Code Execution
- [webapps] - ColoradoFTP 1.3 Prime Edition (Build 8) - Directory Traversal
- [local] - EyeLock Myris 3.3.2 - SDK Service Unquoted Service Path Privilege Escalatio
- [webapps] - vBulletin 5.2.2 - Preauth Server Side Request Forgery (SSRF)
- [webapps] - EyeLock nano NXT 3.5 - Local File Disclosure
- [webapps] - EyeLock nano NXT 3.5 - Remote Root Exploit
- [dos] - SAP SAPCAR - Multiple Vulnerabilities
- [webapps] - WebNMS Framework Server 5.2 and 5.2 SP1 - Multiple Vulnerabilities
- [dos] - Microsoft Office Word 2007,2010,2013,2016 - Out-of-Bounds Read Remote Code Ex
- [webapps] - Nagios Network Analyzer 2.2.1 - Multiple CSRF
- [shellcode] - Linux/x86 - zsh TCP Bind Shell Port 9090 (96 bytes)
- [shellcode] - Linux/x86 - zsh Reverse TCP Shellcode port 9090 (80 bytes)
- [webapps] - WordPress Add From Server Plugin < 3.3.2 - (File Upload) CSRF
- [webapps] - phpCollab CMS 2.5 - (emailusers.php) SQL Injection
- [local] - Microsoft Windows Group Policy - Privilege Escalation (MS16-072)
- [webapps] - Navis WebAccess - SQL Injection
- [remote] - Drupal Module Coder < 7.x-1.3 / 7.x-2.6 - Remote Code Execution Exploit (S
- [webapps] - NUUO NVRmini 2 3.0.8 - (strong_user.php) Backdoor Remote Shell Access
- [webapps] - NUUO NVRmini 2 3.0.8 - Arbitrary File Deletion
- [webapps] - NUUO NVRmini 2 3.0.8 - ShellShock Remote Code Execution
- [webapps] - NUUO NVRmini 2 3.0.8 - Multiple OS Command Injection
- [webapps] - NUUO NVRmini 2 3.0.8 - Local File Disclosure
- [webapps] - NUUO NVRmini 2 3.0.8 - (Add Admin) CSRF
- [webapps] - NUUO NVRmini 2 3.0.8 - Remote Root Exploit
- [dos] - Kodi Web Server 16.1 - Denial of Service
- [webapps] - NASdeluxe NDL-2400r 2.01.09 - OS Command Injection
- [webapps] - WordPress Count per Day Plugin 3.5.4 - Stored Cross-Site Scripting
- [webapps] - Davolink DV-2051 - Multiple Vulnerabilities
- [webapps] - PHP Power Browse 1.2 - Directory Traversal
- [local] - zFTP Client 20061220 - (Connection Name) Local Buffer Overflow
- [webapps] - Subrion CMS 4.0.5 - SQL Injection
- [remote] - ntop 2.3
- [remote] - NUUO NVRmini2 / NVRsolo / Crystal Devices and NETGEAR ReadyNAS Surveillanc
- [dos] - Wireshark 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 - RLC Dissector Denial of Service
- [dos] - Wireshark 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 - WSP Dissector Denial of Service
- [dos] - Wireshark 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 - PacketBB Dissector Denial of Se
- [dos] - Wireshark 2.0.0 to 2.0.4 - CORBA IDL Dissectors Denial of Service
- [dos] - Wireshark 2.0.0 to 2.0.4 - MMSE, WAP, WBXML, and WSP Dissectors Denial of Ser
- [dos] - Wireshark 1.12.0 to 1.12.12 - NDS Dissector Denial of Service
- [webapps] - Open Upload 0.4.2 - (Add Admin) CSRF
- [dos] - Halliburton LogView Pro 9.7.5 - (.cgm/.tif/.tiff/.tifh) Crash PoC
- [webapps] - WordPress WP Live Chat Support Plugin 6.2.03 - Stored XSS
- [webapps] - WordPress ALO EasyMail Newsletter Plugin 2.9.2 - (Add/Import Arbitrary Su
- [webapps] - WordPress Booking Calendar Plugin 6.2 - SQL Injection
- [papers] - [Hebrew] Digital Whisper Security Magazine #74
- [webapps] - PhpMyAdmin 4.6.2 - Post-Auth Remote Code Execution
- [dos] - WebKit - TypedArray.copyWithin Memory Corruption
- [webapps] - Trend Micro Deep Discovery 3.7, 3.8 SP1 (3.81), and 3.8 SP2 (3.82) - hotf
- [shellcode] - Linux/x86 - NetCat Bind Shell with Port (44, 52 bytes)
- [remote] - Easy File Sharing Web Server 7.2 - SEH Overflow (Egghunter)
- [remote] - Barracuda Web Application Firewall 8.0.1.008 - Post Auth Remote Root Explo
- [remote] - Barracuda Web App Firewall 8.0.1.008/Load Balancer 5.4.0.004 - Post Auth R
- [shellcode] - Windows x86 - localhost Port Scanner Shellcode (556 bytes)