Google Security Research
1,215 exploits
Active since May 2013
Microsoft Windows 10 - Access Control
Microsoft Windows 7 - Use After Free
Ciphershed < 0.7.5.0 - Access Control
CVSS 7.8
Microsoft Windows 10 - Information Disclosure
CVSS 4.7
Microsoft Windows 2003 Server - Access Control
Microsoft Windows 10 - Access Control
Microsoft Windows 7 - Memory Corruption
Microsoft Windows 7 - Use After Free
Microsoft Windows 10 - Access Control
Microsoft Windows 10 - Access Control
Microsoft Windows 7 - Use After Free
Microsoft Windows 10 - Memory Corruption
Microsoft Windows 7 - Access Control
Microsoft Windows 10 - Access Control
CVSS 7.8
Windows Desktop Bridge VFS - Privilege Escalation
CVSS 7.8
Trend Micro - 'CoreServiceShell.exe' Multiple HTTP s
Microsoft Windows 7 - Memory Corruption
Adobe Flash Player <18.0.0.232/11.2.202.508 - RCE
Trend Micro Password Manager - Command Injection
CVSS 9.8
Microsoft Forefront Security < 1.1.13701.0 - Memory Corruption
CVSS 7.8
Microsoft Windows 10 - Access Control
Microsoft .net Framework - Remote Code Execution
CVSS 7.8
Microsoft Edge - Privilege Escalation
CVSS 7.4
Microsoft Windows 7 - Improper Input Validation
Comodo AntiVirus - Forwards Emulated API Calls to the Real API During Scans