UberLame CockMilk™ - CURE FOR EVERYTHING IS FINALLY HERE!


CloudMe Sync 1.10.9 Buffer Overflow
http://uberla.me/5zRi7lYh
Disk Savvy Enterprise 10.4.18 Buffer Ovreflow
http://uberla.me/5bDUhr9y
Kernel Live Patch Security Notice LSN-0035-1
http://uberla.me/MLQdHe4W
Asterisk Project Security Advisory - AST-2018-006
http://uberla.me/6xgthCr5
Asterisk Project Security Advisory - AST-2018-004
http://uberla.me/U0h8Ifav
Asterisk Project Security Advisory - AST-2018-005
http://uberla.me/sePHBCRl
Ubuntu Security Notice USN-3583-1
http://uberla.me/G9CNHOEr
Ubuntu Security Notice USN-3583-2
http://uberla.me/ExNpkkng
Debian Security Advisory 4120-1
http://uberla.me/2I3Tyufo
HP Security Bulletin MFSBGN03798 1
http://uberla.me/RmJMQyiz
Windows Kernel win32k!SfnINLPHELPINFOSTRUCT Memory Disclosure
http://uberla.me/8VeKMAeD
Windows Kernel win32k!fnHkINLPMSLLHOOKSTRUCT Memory Disclosure
http://uberla.me/m7wQZzzE
Windows Constrained Impersonation Capability Privilege Escalation
http://uberla.me/2ILpFk00
Microsoft IE11 Js::RegexHelper::RegexReplace Use-After-Free
http://uberla.me/0W1tIrPZ
Asterisk Project Security Advisory - AST-2018-001
http://uberla.me/XUQZBBKx
Asterisk Project Security Advisory - AST-2018-002
http://uberla.me/JPjtBIlF
Red Hat Security Advisory 2018-0342-01
http://uberla.me/HlUFTTdI
Trend Micro Email Encryption Gateway XSS / Code Execution
http://uberla.me/VWV2x3WZ
[webapps] Groupon Clone Script 3.0.2 - Cross-Site Scripting
http://uberla.me/f3SnmQRm
[webapps] Learning and Examination Management System - Cross-Site Scripting
http://uberla.me/HJmrijwj
[local] Armadito Antivirus 0.12.7.2 - Detection Bypass
http://uberla.me/oWlkvK9T
[webapps] Joomla! Component Proclaim 9.1.1 - Arbitrary File Upload
http://uberla.me/pLACroOt
[webapps] Joomla! Component CheckList 1.1.1 - SQL Injection
http://uberla.me/KYLqhbh7
[webapps] Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection
http://uberla.me/Zb6a3eT2
[webapps] Joomla! Component Proclaim 9.1.1 - Backup File Download
http://uberla.me/712A43vZ
[webapps] Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities
http://uberla.me/mkGd5qNe
[webapps] Joomla! Component CW Tags 2.0.6 - SQL Injection
http://uberla.me/HJ0P6CHK
[remote] Disk Pulse Enterprise 10.4.18 - 'Import Command' Buffer Overflow (SEH)
http://uberla.me/aj8ZAcBS
[remote] Disk Savvy Enterprise 10.4.18 - Buffer Overflow (SEH)
http://uberla.me/ZSc0L8WE
[remote] EChat Server 3.1 - 'CHAT.ghp' Buffer Overflow
http://uberla.me/qMqL4oUG
[dos] Wavpack 5.1.0 - Denial of Service
http://uberla.me/ewh5QKps
[local] Microsoft Windows - Global Reparse Point Security Feature Bypass/Elevation of Privilege
http://uberla.me/ik7Bs8uk
[dos] Microsoft Windows Kernel - 'nt!RtlpCopyLegacyContextX86' Stack Memory Disclosure
http://uberla.me/XGeeCUMv
Hashcat Advanced Password Recovery 4.1.0 Binary Release
http://uberla.me/O021r2VW
Hashcat Advanced Password Recovery 4.1.0 Source Code
http://uberla.me/iybOtuBP
Joomla! SquadManagement 1.0.3 SQL Injection
http://uberla.me/FC8l32tV
Joomla! Saxum Picker 3.2.10 SQL Injection
http://uberla.me/vNR6aPTS
Joomla! SimpleCalendar 3.1.9 SQL Injection
http://uberla.me/lchwKyNj
Joomla! Smart Shoutbox 3.0.0 SQL Injection
http://uberla.me/aD3i9gPz
Joomla! JS Jobs 1.1.9 SQL Injection
http://uberla.me/i7U4IZWx
Front Accounting ERP 2.4.3 Cross Site Request Forgery
http://uberla.me/tCpIEjKs
Tenda AC15 Remote Code Execution
http://uberla.me/A0gSfsd8
F-Secure Radar Cross Site Scripting
http://uberla.me/q3QyN92s
[webapps] Joomla! Component JquickContact 1.3.2.2.1 - SQL Injection
http://uberla.me/EMUgUCTD
[webapps] Joomla! Component JomEstate PRO 3.7 - 'id' SQL Injection
http://uberla.me/nMrGds9l
Debian Security Advisory 4115-1
http://uberla.me/dxRvoxHv
Slackware Security Advisory - irssi Updates
http://uberla.me/GOxnQxPq
Suricata IDPE 4.0.4
http://uberla.me/M3EEomPm
Bro Network Security Monitor 2.5.3
http://uberla.me/SpxubyoU
ABRT raceabrt Privilege Escalation
http://uberla.me/6qmIW4Ur
Ubuntu Security Notice USN-3573-1
http://uberla.me/9ignr6V7
Debian Security Advisory 4113-1
http://uberla.me/NKhrMuld
Dell EMC Isilon OneFS XSS / Code Execution / CSRF
http://uberla.me/ahPQ4N7G
Pdfium Pattern Shading Integer Overflow
http://uberla.me/EIjREOWy
Pdfium Shading Pattern Out-Of-Bounds Read
http://uberla.me/fnoVV1ef
Microsoft Edge UnmapViewOfFile ACG Bypass
http://uberla.me/BY6tKGYt
Microsoft Edge Chakra JIT NewScObjectNoCtor Array Type Confusion
http://uberla.me/Sc7r4dIO
The Easiest Metasploit Guide You'll Ever Read
http://uberla.me/8rfYqZ9b
Microsoft Edge Chakra JIT Incomplete Fix
http://uberla.me/xrTUcxyK
[dos] Pdfium - Out-of-Bounds Read with Shading Pattern Backed by Pattern Colorspace
http://uberla.me/wQhVYEad
[dos] Pdfium - Pattern Shading Integer Overflows
http://uberla.me/gtI0nNOo
[dos] Microsoft Edge Chakra JIT - 'NewScObjectNoCtor' Array Type Confusion
http://uberla.me/zHOuGLTW
[dos] Microsoft Edge Chakra JIT - 'Array.prototype.reverse' Array Type Confusion
http://uberla.me/OTBY7baP
[dos] Microsoft Edge Chakra JIT - Memory Corruption
http://uberla.me/nQwFaGKj
[dos] Microsoft Edge Chakra JIT - 'GlobOpt::OptTagChecks' Must Consider IsLoopPrePass Properly (2)
http://uberla.me/Ttcn5CJI
[remote] HPE Intelligent Management Center (iMC) 7.2 (E0403P10) - Code Execution
http://uberla.me/VI63tbkq
[webapps] Dasan Networks GPON ONT WiFi Router H640X versions 12.02-01121 / 2.77p1-1124 / 3.03p2-1146 - Unauthenticated Remote Code Execution
http://uberla.me/MkVkSgIV
[remote] McAfee Security Scan Plus - Remote Command Execution
http://uberla.me/FhoaUlP3
[local] Dashlane - DLL Hijacking
http://uberla.me/a1sjWpCx
[webapps] Hanbanggaoke IP Camera - Arbitrary Password Change
http://uberla.me/Pz6HGbJM
[webapps] QNAP HelpDesk < 1.1.12 - SQL Injection
http://uberla.me/6uJaY9ON
[local] Hotspot Shield - Information Disclosure
http://uberla.me/9b0uv4mF
[papers] The Easiest Metasploit Guide Youll Ever Read
http://uberla.me/aVKakT3k
[webapps] Dell EMC Isilon OneFS - Multiple Vulnerabilities
http://uberla.me/1ugBUwgl
[webapps] userSpice 4.3 - Cross-Site Scripting
http://uberla.me/4Qq5pDCJ
[webapps] SOA School Management - 'access_login' SQL Injection
http://uberla.me/LVzfSh9c
[webapps] Social Oauth Login PHP - Authentication Bypass
http://uberla.me/5emYJOZ8
[dos] GNU binutils 2.26.1 - Integer Overflow (POC)
http://uberla.me/utcVvosu
[webapps] NAT32 2.2 Build 22284 - Cross-Site Request Forgery
http://uberla.me/uvTIxW2K
[webapps] NAT32 2.2 Build 22284 - Remote Command Execution
http://uberla.me/aYcqiVFy
Debian Security Advisory 4111-2
http://uberla.me/utgLxN6E
Red Hat Security Advisory 2018-0296-01
http://uberla.me/AqJpCqkd
HP Security Bulletin HPESBHF03819 1
http://uberla.me/BmKiPOUG
Ubuntu Security Notice USN-3568-1
http://uberla.me/k4aNVlqn
[papers] From APK to Golden Ticket
http://uberla.me/D3rv93ML
[remote] Advantech WebAccess 8.3.0 - Remote Code Execution
http://uberla.me/b2o3bLov
[webapps] TypeSetter CMS 5.1 - Cross-Site Request Forgery
http://uberla.me/Ol3Ie6wQ
[webapps] TypeSetter CMS 5.1 - 'Host' Header Injection
http://uberla.me/RsMdAisu
[remote] CloudMe Sync < 1.11.0 - Buffer Overflow
http://uberla.me/ffa7Ot48
Ubuntu Security Notice USN-3567-1
http://uberla.me/GFIvXFk3
Red Hat Security Advisory 2018-0294-01
http://uberla.me/stTH3rUa
Gentoo Linux Security Advisory 201802-01
http://uberla.me/0xicWCom
Ubuntu Security Notice USN-3565-1
http://uberla.me/KDL2r0je
[papers] TCP Starvation
http://uberla.me/4ut7P71v
[local] glibc - '$ORIGIN' Expansion Privilege Escalation (Metasploit)
http://uberla.me/Tmkii4BO
[local] Juju-run Agent - Privilege Escalation (Metasploit)
http://uberla.me/OKGN66NA
[remote] LibreOffice < 6.0.1 - '=WEBSERVICE' Remote Arbitrary File Disclosure
http://uberla.me/ElNuoO2N
[webapps] LogicalDOC Enterprise 7.7.4 - Root Remote Code Execution
http://uberla.me/ltdSqyxW
[webapps] LogicalDOC Enterprise 7.7.4 - User Enumeration
http://uberla.me/FzMIzoNE
[webapps] LogicalDOC Enterprise 7.7.4 - Directory Traversal
http://uberla.me/dpgSt87J