- [remote] ManageEngine OpManager 12.4x - Privilege Escalation / Remote Command Executi
- [webapps] osTicket 1.12 - Persistent Cross-Site Scripting
- [webapps] osTicket 1.12 - Formula Injection
- [webapps] osTicket 1.12 - Persistent Cross-Site Scripting via File Upload
- [webapps] Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.p
- [webapps] Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketre
- [webapps] UNA 10.0.0 RC1 - 'polyglot.php' Persistent Cross-Site Scripting
- [webapps] Cisco Adaptive Security Appliance - Path Traversal (Metasploit)
- [webapps] BSI Advance Hotel Booking System 2.0 - 'booking_details.php Persistent Cros
- [webapps] Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 -
- [webapps] Adive Framework 2.0.7 - Cross-Site Request Forgery
- [webapps] Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 -
- [remote] Baldr Botnet Panel - Arbitrary Code Execution (Metasploit)
- [webapps] Aptana Jaxer 1.0.3.4547 - Local File inclusion
- [webapps] Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income)
- [webapps] Open-School 3.0 / Community Edition 2.3 - Cross-Site Scripting
- [dos] Google Chrome 74.0.3729.0 / 76.0.3789.0 - Heap Use-After-Free in blink::Present
- [webapps] WordPress Plugin JoomSport 3.3 - SQL Injection
- [remote] ARMBot Botnet - Arbitrary Code Execution
- [remote] Apache Tika 1.15 - 1.17 - Header Command Injection (Metasploit)
- [dos] macOS iMessage - Heap Overflow when Deserializing
- [webapps] 1CRM On-Premise Software 8.5.7 - Persistent Cross-Site Scripting
- [webapps] Rest - Cafe and Restaurant Website CMS - 'slug' SQL Injection
- [webapps] Sar2HTML 3.2.1 - Remote Command Execution
- [webapps] Cisco Catalyst 3850 Series Device Manager - Cross-Site Request Forgery
- [webapps] WebIncorp ERP - SQL injection
- [webapps] Ultimate Loan Manager 2.0 - Cross-Site Scripting
- [webapps] Oracle Hyperion Planning 11.1.2.3 - XML External Entity
- [remote] Redis 4.x / 5.x - Unauthenticated Code Execution (Metasploit)
- [dos] iMessage - NSKeyedUnarchiver Deserialization Allows file Backed NSData Objects
- [dos] iMessage - Memory Corruption when Decoding NSKnownKeysDictionary1
- [dos] iMessage - NSArray Deserialization can Invoke Subclass that does not Retain Ref
- [dos] macOS / iOS NSKeyedUnarchiver - Use-After-Free of ObjC Objects when Unarchiving
- [dos] macOS / iOS JavaScriptCore - JSValue Use-After-Free in ValueProfiles
- [dos] macOS / iOS JavaScriptCore - Loop-Invariant Code Motion (LICM) Leaves Object Pr
- [webapps] Amcrest Cameras 2.520.AC00.18.R - Unauthenticated Audio Streaming
- [remote] WP Database Backup < 5.2 - Remote Code Execution (Metasploit)
- [remote] Schneider Electric Pelco Endura NET55XX Encoder - Authentication Bypass (Met
- [webapps] GigToDo 1.3 - Cross-Site Scripting
- [webapps] WordPress Theme Real Estate 2.8.9 - Cross-Site Scripting
- [webapps] WordPress Plugin Simple Membership < 3.8.5 - Cross-Site Request Forgery
- [webapps] Ahsay Backup 7.x - 8.1.1.50 - XML External Entity Injection
- [webapps] Ahsay Backup 7.x - 8.1.1.50 - Authenticated Arbitrary File Upload / Remote
- [webapps] Ahsay Backup 7.x - 8.1.1.50 - Authenticated Arbitrary File Upload / Remote
- [dos] pdfresurrect 0.15 - Buffer Overflow
- [webapps] Moodle Filepicker 3.5.2 - Server Side Request Forgery
- [local] Microsoft Windows 7 build 7601 (x86) - Local Privilege Escalation
- [local] Deepin Linux 15 - 'lastore-daemon' Local Privilege Escalation
- [local] ASAN/SUID - Local Privilege Escalation
- [local] Serv-U FTP Server < 15.1.7 - Local Privilege Escalation (2)
- [local] S-nail < 14.8.16 - Local Privilege Escalation
- [local] VMware Workstation/Player < 12.5.5 - Local Privilege Escalation
- [local] Linux Kernel 4.4.0-21 < 4.4.0-51 (Ubuntu 14.04/16.04 x86-64) - 'AF_PACKET' Ra
- [local] Linux Kernel < 4.4.0/ < 4.8.0 (Ubuntu 14.04/16.04 / Linux Mint 17/18 / Zorin)
- [local] Linux Kernel 4.8.0-34 < 4.8.0-45 (Ubuntu / Linux Mint) - Packet Socket Local
- [local] Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Es
- [local] Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Es
- [local] Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Es
- [local] Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Es
- [local] Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalati
- [dos] WebKit - Universal Cross-Site Scripting due to Synchronous Page Loads
- [webapps] Ovidentia 8.4.3 - SQL Injection
- [webapps] Ovidentia 8.4.3 - Cross-Site Scripting
- [dos] Apple iMessage - DigitalTouch tap Message Processing Out-of-Bounds Read
- [remote] Trend Micro Deep Discovery Inspector IDS - Security Bypass
- [webapps] WordPress Plugin Hybrid Composer 1.4.6 - Improper Access Restrictions
- [webapps] Cisco Wireless Controller 3.6.10E - Cross-Site Request Forgery
- [webapps] NoviSmart CMS - SQL injection
- [webapps] Axway SecureTransport 5 - Unauthenticated XML Injection
- [local] Comtrend-AR-5310 - Restricted Shell Escape
- [dos] BACnet Stack 0.8.6 - Denial of Service
- [local] Docker - Container Escape
- [webapps] REDCap < 9.1.2 - Cross-Site Scripting
- [webapps] Web Ofisi Firma 13 - 'oz' SQL Injection
- [webapps] Web Ofisi Rent a Car 3 - 'klima' SQL Injection
- [webapps] Web Ofisi Firma Rehberi 1 - 'il' SQL Injection
- [webapps] Web Ofisi Emlak 3 - 'emlak_durumu' SQL Injection
- [webapps] Web Ofisi Emlak 2 - 'ara' SQL Injection
- [webapps] Web Ofisi Platinum E-Ticaret 5 - 'q' SQL Injection
- [webapps] Web Ofisi E-Ticaret 3 - 'a' SQL Injection
- [webapps] fuelCMS 1.4.1 - Remote Code Execution
- [remote] MAPLE Computer WBT SNMP Administrator 2.0.195.15 - Remote Buffer Overflow (E
- [webapps] WordPress Plugin OneSignal 1.17.5 - 'subdomain' Persistent Cross-Site Scrip
- [local] Microsoft Windows 10 1903/1809 - RPCSS Activation Kernel Security Callback Pr
- [local] Windows - NtUserSetWindowFNID Win32k User Callback Privilege Escalation (Meta
- [local] Linux - Broken Permission and Object Lifetime Handling for PTRACE_TRACEME
- [webapps] Oracle Siebel CRM 19.0 - Persistent Cross-Site Scripting
- [dos] WinMPG iPod Convert 3.0 - 'Register' Denial of Service
- [remote] MAPLE Computer WBT SNMP Administrator 2.0.195.15 - Remote Buffer Overflow
- [remote] PHP Laravel Framework 5.5.40 / 5.6.x < 5.6.30 - token Unserialize Remote Com
- [local] Microsoft Windows 10 < build 17763 - AppXSvc Hard Link Privilege Escalation (
- [dos] Microsoft Compiled HTML Help / Uncompiled .chm File - XML External Entity Injec
- [local] DameWare Remote Support 12.0.0.509 - 'Host' Buffer Overflow (SEH)
- [webapps] CentOS Control Web Panel 0.9.8.838 - User Enumeration
- [webapps] CentOS Control Web Panel 0.9.8.836 - Privilege Escalation
- [webapps] CentOS Control Web Panel 0.9.8.836 - Authentication Bypass
- [local] R 3.4.4 (Windows 10 x64) - Buffer Overflow SEH (DEP/ASLR Bypass)
- [webapps] FlightPath < 4.8.2 / < 5.0-rc2 - Local File Inclusion
- [dos] Microsoft Windows Remote Desktop - 'BlueKeep' Denial of Service (Metasploit)
- [dos] Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write
- [webapps] CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities
- [webapps] NETGEAR WiFi Router JWNR2010v5 / R6080 - Authentication Bypass
- [local] Streamripper 2.6 - 'Song Pattern' Buffer Overflow
- [local] Microsoft Windows 10.0.17134.648 - HTTP -> SMB NTLM Reflection Leads to Privi
- [remote] Xymon 4.3.25 - useradm Command Execution (Metasploit)
- [dos] Microsoft Font Subsetting - DLL Heap Corruption in ComputeFormat4CmapData
- [webapps] Citrix SD-WAN Appliance 10.2.2 - Authentication Bypass / Remote Command Exe
- [webapps] Jenkins Dependency Graph View Plugin 0.13 - Persistent Cross-Site Scripting
- [webapps] Sahi Pro 8.0.0 - Remote Command Execution
- [webapps] MyT Project Management 1.5.1 - User[username] Persistent Cross-Site Scripti
- [webapps] Tenda D301 v2 Modem Router - Persistent Cross-Site Scripting
- [webapps] Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting
- [local] SNMPc Enterprise Edition 9/10 - Mapping Filename Buffer Overflow
- [dos] Microsoft DirectWrite / AFDKO - Heap-Based Out-of-Bounds Read/Write in OpenType
- [dos] Microsoft DirectWrite / AFDKO - Multiple Bugs in OpenType Font Handling Related
- [dos] Microsoft DirectWrite / AFDKO - Out-of-Bounds Read in OpenType Font Handling Du
- [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Whil
- [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Han
- [dos] Microsoft DirectWrite / AFDKO - Heap-Based Out-of-Bounds Read/Write in OpenType
- [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow Due to Integer Overf
- [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Han
- [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Han
- [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Han
- [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due
- [dos] Microsoft DirectWrite / AFDKO - Interpreter Stack Underflow in OpenType Font Ha
- [dos] Microsoft DirectWrite / AFDKO - Use of Uninitialized Memory While Freeing Resou
- [dos] Microsoft DirectWrite / AFDKO - Stack-Based Buffer Overflow in do_set_weight_ve
- [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due
- [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due
- [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling due
- [dos] Microsoft Windows - Font Subsetting DLL Heap-Based Out-of-Bounds Read in MergeF
- [dos] Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access
- [remote] Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Buffer Overflow (2)
- [dos] Firefox 67.0.4 - Denial of Service
- [webapps] WordPress Plugin Like Button 1.6.0 - Authentication Bypass
- [webapps] Karenderia Multiple Restaurant System 5.3 - SQL Injection
- [remote] Microsoft Exchange 2003 - base64-MIME Remote Code Execution
- [webapps] Karenderia Multiple Restaurant System 5.3 - Local File Inclusion
- [remote] Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (Met
- [local] Serv-U FTP Server - prepareinstallation Privilege Escalation (Metasploit)
- [webapps] Symantec DLP 15.5 MP1 - Cross-Site Scripting
- [local] Mac OS X TimeMachine - (tmdiagnose) Command Injection Privilege Escalation (M
- [webapps] Centreon 19.04 - Remote Code Execution
- [shellcode] Linux/x86 - execve /bin/sh using JMP-CALL-POP Shellcode (21 bytes)
- [remote] FaceSentry Access Control System 6.4.8 - Remote SSH Root
- [webapps] FaceSentry Access Control System 6.4.8 - Remote Root Exploit
- [webapps] FaceSentry Access Control System 6.4.8 - Cross-Site Request Forgery
- [webapps] FaceSentry Access Control System 6.4.8 - Remote Command Injection
- [webapps] CyberPanel 1.8.4 - Cross-Site Request Forgery
- [webapps] Sahi pro 8.x - Directory Traversal
- [webapps] SAP Crystal Reports - Information Disclosure
- [webapps] ZoneMinder 1.32.3 - Cross-Site Scripting
- [webapps] PowerPanel Business Edition - Cross-Site Scripting
- [webapps] Varient 1.6.1 - SQL Injection
- [shellcode] Linux/ARM64 - execve("/bin/sh", ["/bin/sh"], NULL) Shellcode (48 Bytes)
- [shellcode] Linux/ARM64 - Jump Back Shellcode + execve("/bin/sh", NULL, NULL) Shellco
- [shellcode] Linux/ARM64 - mmap() + read() stager + execve("/bin/sh", NULL, NULL) Shel
- [shellcode] Linux/ARM64 - Egghunter (PWN!PWN!) + execve("/bin/sh", NULL, NULL) + mpro
- [shellcode] Linux/ARM64 - Read /etc/passwd Shellcode (120 Bytes)
- [shellcode] Linux/ARM64 - Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (140
- [shellcode] Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes
- [shellcode] Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Sh
- [shellcode] Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164
- [shellcode] Linux/ARM64 - execve("/bin/sh", NULL, NULL) Shellcode (40 Bytes)
- [remote] Linux Mint 18.3-19.1 - 'yelp' Command Injection (Metasploit)
- [webapps] CiuisCRM 1.6 - 'eventType' SQL Injection
- [webapps] WorkSuite PRM 2.4 - 'password' SQL Injection
- [webapps] LibreNMS 1.46 - 'addhost' Remote Code Execution
- [shellcode] Linux/x86 - Chmod + Execute (/usr/bin/wget http://192.168.1.93//x) + Hide
- [shellcode] Windows/x86 - Start iexplore.exe (http://192.168.10.10/) Shellcode (191 B
- [shellcode] Windows/x86 - bitsadmin Download and Execute (http://192.168.10.10/evil.e
- [shellcode] Linux/x86 - ASCII AND, SUB, PUSH, POPAD Encoder Shellcode
- [remote] Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit)
- [dos] Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion
- [webapps] WordPress Plugin Live Chat Unlimited 2.8.3 - Cross-Site Scripting
- [webapps] WordPress Plugin iLive 1.0.4 - Cross-Site Scripting
- [webapps] BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal
- [webapps] AZADMIN CMS 1.0 - SQL Injection
- [webapps] Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution
- [papers] Buffer Overflows, C Programming, NSA GHIDRA and More
- [remote] SAPIDO RB-1732 - Remote Command Execution
- [remote] SuperDoctor5 - 'NRPE' Remote Code Execution
- [dos] Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation
- [dos] Microsoft Windows - 'CmpAddRemoveContainerToCLFSLog' Arbitrary File/Directory C
- [webapps] GrandNode 4.40 - Path Traversal / Arbitrary File Download
- [dos] GSearch 1.0.1.0 - Denial of Service (PoC)
- [shellcode] Linux/x86_64 - Reverse(0.0.0.0:4444/TCP) Shell (/bin/sh) Shellcode
- [webapps] SeedDMS < 5.1.11 - 'out.GroupMgr.php' Cross-Site Scripting
- [webapps] SeedDMS < 5.1.11 - 'out.UsrMgr.php' Cross-Site Scripting
- [webapps] SeedDMS versions < 5.1.11 - Remote Command Execution
- [webapps] dotProject 2.1.9 - SQL Injection
- [papers] Sony PlayStation Vita (PS Vita) - Trinity: PSP Emulator Escape
- [remote] EA Origin < 10.5.38 - Remote Code Execution
- [papers] Threat Hunting - Hunter or Hunted
- [local] Cisco Prime Infrastructure - Runrshell Privilege Escalation (Metasploit)
- [remote] Cisco Prime Infrastructure Health Monitor - TarArchive Directory Traversal (
- [dos] Linux - Use-After-Free via race Between modify_ldt() and #BR Exception
- [webapps] BlogEngine.NET 3.3.6/3.3.7 - XML External Entity Injection
- [webapps] WebERP 4.15 - SQL injection
- [local] Tuneclone 2.20 - Local SEH Buffer Overflow
- [webapps] BlogEngine.NET 3.3.6/3.3.7 - 'theme Cookie' Directory Traversal / Remote Co
- [webapps] BlogEngine.NET 3.3.6/3.3.7 - 'dirPath' Directory Traversal / Remote Code Ex
- [local] Serv-U FTP Server < 15.1.7 - Local Privilege Escalation
- [shellcode] Linux/x86_64 - execve(/bin/sh) Shellcode (22 bytes)
- [webapps] Sahi pro 8.x - Cross-Site Scripting
- [webapps] Sahi pro 8.x - SQL Injection
- [webapps] Sahi pro 7.x/8.x - Directory Traversal
- [dos] Thunderbird ESR < 60.7.XXX - 'icalrecur_add_bydayrules' Stack-Based Buffer Over
- [dos] Thunderbird ESR < 60.7.XXX - 'parser_get_next_char' Heap-Based Buffer Overflow
- [dos] Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Ove
- [dos] Thunderbird ESR < 60.7.XXX - Type Confusion
- [webapps] Spring Security OAuth - Open Redirector
- [remote] AROX School-ERP Pro - Unauthenticated Remote Command Execution (Metasploit)
- [local] Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (Pow
- [dos] Netperf 2.6.0 - Stack-Based Buffer Overflow
- [local] Exim 4.87 - 4.91 - Local Privilege Escalation
- [shellcode] Linux/x86 - Reposition + INC encoder with execve(/bin/sh) Shellcode (66 b
- [webapps] CleverDog Smart Camera DOG-2W / DOG-2W-V4 - Multiple Vulnerabilities
- [webapps] RedwoodHQ 2.5.5 - Authentication Bypass
- [local] Aida64 6.00.5100 - 'Log to CSV File' Local SEH Buffer Overflow
- [papers] Active Directory Enumeration with PowerShell
- [local] CentOS 7.6 - 'ptrace_scope' Privilege Escalation
- [local] Pronestor Health Monitoring < 8.1.11.0 - Privilege Escalation
- [webapps] Sitecore 8.x - Deserialization Remote Code Execution
- [papers] LDAP Swiss Army Knife
- [webapps] FusionPBX 4.4.3 - Remote Command Execution
- [remote] Webmin 1.910 - 'Package Updates' Remote Command Execution (Metasploit)
- [webapps] Liferay Portal 7.1 CE GA=3 / SimpleCaptcha API - Cross-Site Scripting
- [webapps] phpMyAdmin 4.8 - Cross-Site Request Forgery
- [webapps] WordPress Plugin Insert or Embed Articulate Content into WordPress - Remote
- [local] ProShow 9.0.3797 - Local Privilege Escalation
- [shellcode] Linux/x86_64 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (104 bytes)
- [local] Ubuntu 18.04 - 'lxd' Privilege Escalation
- [webapps] UliCMS 2019.1 'Spitting Lama' - Persistent Cross-Site Scripting
- [local] Microsoft Windows - AppX Deployment Service Local Privilege Escalation (3)
- [shellcode] Linux/x86_64 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (131 bytes)
- [remote] Exim 4.87 < 4.91 - (Local / Remote) Command Execution
- [local] Vim < 8.1.1365 / Neovim < 0.3.6 - Arbitrary Code Execution
- [local] Nvidia GeForce Experience Web Helper - Command Injection
- [webapps] Supra Smart Cloud TV - 'openLiveURL()' Remote File Inclusion
- [remote] LibreNMS - addhost Command Injection (Metasploit)
- [remote] IBM Websphere Application Server - Network Deployment Untrusted Data Deseria
- [dos] Google Chrome 73.0.3683.103 - 'WasmMemoryObject::Grow' Use-After-Free
- [webapps] Zimbra < 8.8.11 - XML External Entity Injection / Server-Side Request Forge
- [webapps] Zoho ManageEngine ServiceDesk Plus 9.3 - 'PurchaseRequest.do' Cross-Site Sc
- [webapps] Zoho ManageEngine ServiceDesk Plus 9.3 - 'SearchN.do' Cross-Site Scripting
- [webapps] Zoho ManageEngine ServiceDesk Plus 9.3 - 'SolutionSearch.do' Cross-Site Scr
- [webapps] Zoho ManageEngine ServiceDesk Plus 9.3 - 'SiteLookup.do' Cross-Site Scripti
- [local] DVD X Player 5.5 Pro - Local Buffer Overflow (SEH)
- [remote] Cisco RV130W 1.0.3.44 - Remote Stack Overflow