Zoho ManageEngine 13 (13790 build) XSS / File Read / File Deletion - http://uberla.me/djQG8hUH
[webapps] GeoVision GV-SNVR0811 - Directory Traversal - http://uberla.me/RIuRrILx
Microsoft dnslint.exe DNS Tool Forced Drive-By Download - http://uberla.me/2IivHHtY
SSLsplit 0.5.3 - http://uberla.me/sJJjblZA
RSA Archer 6.x Cross Site Scripting / Authorization Bypass - http://uberla.me/0XGX7Vfv
VMware Security Advisory 2018-0018 - http://uberla.me/QYfufOmS
[dos] TP-Link TL-WR840N - Denial of Service - http://uberla.me/w8Xuom2s
[webapps] Touchpad / Trivum WebTouch Setup 2.53 build 13163 - Authentication Bypass - http://uberla.me/XJksZle6
[webapps] MSVOD 10 - 'cid' SQL Injection - http://uberla.me/sHTECEAy
WordPress All In One Favicon 4.6 Cross Site Scripting - http://uberla.me/9M1QVxJc
CMS Made Simple 2.2.5 Authenticated Remote Command Execution - http://uberla.me/iQjYN7mv
[dos] Google Chrome - Swiftshader Blitting Floating-Point Precision Errors - http://uberla.me/zrV58A6x
[dos] Google Chrome - Swiftshader Texture Allocation Integer Overflow - http://uberla.me/GgEQSQbD
Slackware Security Advisory - httpd Updates - http://uberla.me/Hm7zoyjN
Red Hat Security Advisory 2018-2214-01 - http://uberla.me/KMd9qmCC
[local] Linux - BPF Sign Extension Local Privilege Escalation (Metasploit) - http://uberla.me/ou7hK29F
[webapps] MyBB New Threads Plugin 1.1 - Cross-Site Scripting - http://uberla.me/sy3LZoJk
[webapps] WordPress Plugin All In One Favicon 4.6 - Cross-Site Scripting - http://uberla.me/LwCXnMyh
Linux BPF Sign Extension Local Privilege Escalation - http://uberla.me/2ruyQwbz
Wireshark Analyzer 2.6.2 - http://uberla.me/C2MMTfXi
Capstone 3.0.5 - http://uberla.me/Q6g3Lql8
Suricata IDPE 4.0.5 - http://uberla.me/Ze5o5d9Y
Barracuda Cloud Control 7.1.1.003 Cross Site Scripting - http://uberla.me/ilRwhkzp
AntiVirus Evasion With Metasploit's Web Delivery - http://uberla.me/Gy3eojYX
FTP2FTP 1.0 Arbitrary File Download - http://uberla.me/siLMQ7hp
Open-AudIT Community 2.1.1 Cross Site Scripting - http://uberla.me/UKNCCZF7
[papers] Abusing Kerberos - Kerberoasting - http://uberla.me/iumEnO4a
[papers] VLAN Hopping Attack - http://uberla.me/ehYiD3HJ
[webapps] Smart SMS - http://uberla.me/C6UzTlX1
[local] JavaScript Core - Arbitrary Code Execution - http://uberla.me/UbU1MHe4
[webapps] PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation - http://uberla.me/VTENDk0X
[webapps] PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation - http://uberla.me/sC32ZvSI
[papers] Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup - http://uberla.me/mf8HJK6n
HomeMatic Zentrale CCU2 Unauthenticated Remote Code Execution - http://uberla.me/NbnBWEDy
Binance 1.5.0 Insecure File Permission - http://uberla.me/ZSlAovyE
[remote] Nanopool Claymore Dual Miner - APIs RCE (Metasploit) - http://uberla.me/Vfh8dCWG
[remote] QNAP Q'Center - change_passwd Command Execution (Metasploit) - http://uberla.me/xslKGnJv
[local] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape - http://uberla.me/4XZrTUAp
[remote] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials - http://uberla.me/nVSTTcga
[shellcode] Linux/x64 - Reverse (::1:1337/TCP) IPv6 Password (pwnd) Shellcode (115 bytes) - http://uberla.me/hZ01r6dp
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Remote Root - http://uberla.me/aD7zUEX2
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation - http://uberla.me/rykDUoRD
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download - http://uberla.me/vubXmDX3
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service - http://uberla.me/N4evUe49
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery - http://uberla.me/2B8QvX4S
[shellcode] Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes) - http://uberla.me/W56ZCwrt
[papers] Exploiting the Obvious - Bluetooth Trust Relationships - http://uberla.me/Z6d2Py5t
Nanopool Claymore Dual Miner APIs Remote Code Execution - http://uberla.me/28dBQDZq
QNAP Q'Center change_passwd Command Execution - http://uberla.me/VIukziWA
[webapps] Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection - http://uberla.me/NjeGUbd6
[local] Microsoft Enterprise Mode Site List Manager - XML External Entity Injection - http://uberla.me/r0Rpb91a
[webapps] QNAP Qcenter Virtual Appliance - Multiple Vulnerabilities - http://uberla.me/LgeBM9gR
[webapps] WAGO e!DISPLAY 7300T - Multiple Vulnerabilities - http://uberla.me/lgg4E59p
Microsoft Windows POP/MOV SS Local Privilege Elevation - http://uberla.me/MdpyVlfr
Linux/Ubuntu Coredump Reading Access Bypass - http://uberla.me/sx5WaA73
CloudMe Sync 1.10.9 Buffer Overflow - http://uberla.me/5zRi7lYh
Disk Savvy Enterprise 10.4.18 Buffer Ovreflow - http://uberla.me/5bDUhr9y
Kernel Live Patch Security Notice LSN-0035-1 - http://uberla.me/MLQdHe4W
Asterisk Project Security Advisory - AST-2018-006 - http://uberla.me/6xgthCr5
Asterisk Project Security Advisory - AST-2018-004 - http://uberla.me/U0h8Ifav
Asterisk Project Security Advisory - AST-2018-005 - http://uberla.me/sePHBCRl
Ubuntu Security Notice USN-3583-1 - http://uberla.me/G9CNHOEr
Ubuntu Security Notice USN-3583-2 - http://uberla.me/ExNpkkng
Debian Security Advisory 4120-1 - http://uberla.me/2I3Tyufo
HP Security Bulletin MFSBGN03798 1 - http://uberla.me/RmJMQyiz
Windows Kernel win32k!SfnINLPHELPINFOSTRUCT Memory Disclosure - http://uberla.me/8VeKMAeD
Windows Kernel win32k!fnHkINLPMSLLHOOKSTRUCT Memory Disclosure - http://uberla.me/m7wQZzzE
Windows Constrained Impersonation Capability Privilege Escalation - http://uberla.me/2ILpFk00
Microsoft IE11 Js::RegexHelper::RegexReplace Use-After-Free - http://uberla.me/0W1tIrPZ
Asterisk Project Security Advisory - AST-2018-001 - http://uberla.me/XUQZBBKx
Asterisk Project Security Advisory - AST-2018-002 - http://uberla.me/JPjtBIlF
Red Hat Security Advisory 2018-0342-01 - http://uberla.me/HlUFTTdI
Trend Micro Email Encryption Gateway XSS / Code Execution - http://uberla.me/VWV2x3WZ
[webapps] Groupon Clone Script 3.0.2 - Cross-Site Scripting - http://uberla.me/f3SnmQRm
[webapps] Learning and Examination Management System - Cross-Site Scripting - http://uberla.me/HJmrijwj
[local] Armadito Antivirus 0.12.7.2 - Detection Bypass - http://uberla.me/oWlkvK9T
[webapps] Joomla! Component Proclaim 9.1.1 - Arbitrary File Upload - http://uberla.me/pLACroOt
[webapps] Joomla! Component CheckList 1.1.1 - SQL Injection - http://uberla.me/KYLqhbh7
[webapps] Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection - http://uberla.me/Zb6a3eT2
[webapps] Joomla! Component Proclaim 9.1.1 - Backup File Download - http://uberla.me/712A43vZ
[webapps] Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities - http://uberla.me/mkGd5qNe
[webapps] Joomla! Component CW Tags 2.0.6 - SQL Injection - http://uberla.me/HJ0P6CHK
[remote] Disk Pulse Enterprise 10.4.18 - 'Import Command' Buffer Overflow (SEH) - http://uberla.me/aj8ZAcBS
[remote] Disk Savvy Enterprise 10.4.18 - Buffer Overflow (SEH) - http://uberla.me/ZSc0L8WE
[remote] EChat Server 3.1 - 'CHAT.ghp' Buffer Overflow - http://uberla.me/qMqL4oUG
[dos] Wavpack 5.1.0 - Denial of Service - http://uberla.me/ewh5QKps
[local] Microsoft Windows - Global Reparse Point Security Feature Bypass/Elevation of Privilege - http://uberla.me/ik7Bs8uk
[dos] Microsoft Windows Kernel - 'nt!RtlpCopyLegacyContextX86' Stack Memory Disclosure - http://uberla.me/XGeeCUMv
Hashcat Advanced Password Recovery 4.1.0 Binary Release - http://uberla.me/O021r2VW
Hashcat Advanced Password Recovery 4.1.0 Source Code - http://uberla.me/iybOtuBP
Joomla! SquadManagement 1.0.3 SQL Injection - http://uberla.me/FC8l32tV
Joomla! Saxum Picker 3.2.10 SQL Injection - http://uberla.me/vNR6aPTS
Joomla! SimpleCalendar 3.1.9 SQL Injection - http://uberla.me/lchwKyNj
Joomla! Smart Shoutbox 3.0.0 SQL Injection - http://uberla.me/aD3i9gPz
Joomla! JS Jobs 1.1.9 SQL Injection - http://uberla.me/i7U4IZWx
Front Accounting ERP 2.4.3 Cross Site Request Forgery - http://uberla.me/tCpIEjKs
Tenda AC15 Remote Code Execution - http://uberla.me/A0gSfsd8
F-Secure Radar Cross Site Scripting - http://uberla.me/q3QyN92s
[webapps] Joomla! Component JquickContact 1.3.2.2.1 - SQL Injection - http://uberla.me/EMUgUCTD
[webapps] Joomla! Component JomEstate PRO 3.7 - 'id' SQL Injection - http://uberla.me/nMrGds9l