ArticleSetup version 1.00 suffers from a cross site request forgery vulnerability.
1f458022debc10195e34d8866e66c26e6df8f427f0e1908ceeaa5a4a52d67057
miniMySQLAdmin version 1.1.3 suffers from a cross site request forgery vulnerability.
f367cbf9547697404b7e76b7446e3a05f184a5d8c08038e4da507480982d36b5
There is an OS X exploitable kernel NULL dereference in CoreCaptureResponder due to unchecked return value.
46db86ae3c269c855be0fa86158ce3d865227cc9c9d762ba3c3f0f9abf418370
There is an OS X exploitable kernel NULL pointer dereference in AppleGraphicsDeviceControl.
fff8a4440decd556ffa6cebdc500fc713db56d8a1a1d8bb199d49b0b849765b5
This is a proof of concept of an OS X / iOS kernel use-after-free racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient.
79081df20f058ae04524d60bd64ede2274ad0427278d2da4608b9c9253bfcd1f
There is an OS X exploitable kernel NULL pointer dereference in IOAudioEngine.
4918561f38647def9464de2b414899c5d7557c4435012dbcbcea3c5497c082bb
Proof of concept demonstrating an OS X kernel out-of-bounds read of an object pointer due to insufficient checks in raw cast to enum type.
589a7ffaa9683f1d874572aef114c962c63306ff50bb686d2a107d9d170bac41
There is an OS X exploitable kernel NULL pointer dereference in nvCommandQueue::GetHandleIndex in GeForce.kext.
9867c3b07af33066486e5bd1019b6c4444cefb3ae2ffd7c607b4787e32aebfd0
There's an OS X kernel stack buffer overflow in the GeForce gpu driver.
bd03809ea947c0522405f8f40bebc6bc8cceafabe05084804c9bf2911e696feb
There is an OS X exploitable kernel NULL pointer dereference in AppleMuxControl.kext.
882ed3c4cf58751cbf4938eb0d1c050d9a0e55f797c654e4b25181c2edfb6e6a
The OS X kernel suffers from a use-after-free vulnerability due to bad locking in IOAcceleratorFamily2.
a8600ecd3178e15e44a38fe6d006ebd5db953d2b5664662921d97ffa1ab5c4f2
There is an OS X exploitable kernel NULL dereference in IOAccelSharedUserClient2::page_off_resource.
35fee7c0806456b5b64e9ba3318bc1a3ba2c423a3d6c5686c17965f2c8c6c06d
PHPFox version 4 suffers from a cross site scripting vulnerability.
141186edcae31f25f7e09ee42832fb75b900845a261b04bb2a3b8ba2ce2d385f
Microsoft Word denial of service proof of concept. Let Word recover it, its essential, and then you can trigger the bug afterwards in 3 ways - Save, Close/Save, change format.
1028cf2faffc6436fe6d108cb2c194b3facceb9adbea7d1303ede10dd174a785