Google Security Research
1,215 exploits
Active since May 2013
Xen <4.9 - Memory Corruption
CVSS 8.2
Oracle VM VirtualBox <5.0.38-5.1.20 - RCE
CVSS 8.5
Apple Iphone OS < 10.2.1 - Memory Corruption
CVSS 7.8
Apple <10.3.3, <10.12.6, <10.2.2, <3.2.3 - RCE/DoS
CVSS 8.8
Apple <10.3.2, <10.12.5 - Privilege Escalation
CVSS 7.0
Apple Iphone OS < 10.1.1 - Access Control
CVSS 7.8
Apple iOS <9.3 & OS X <10.11.4 - RCE
CVSS 7.0
Apple TV < 11.4 - Memory Corruption
CVSS 7.8
Wireshark - wtap_optionblock_free Use-After-Free
Wireshark - Improper Input Validation
CVSS 5.5
Wireshark - vwr_read_s2_s3_W_rec Heap Buffer Overflow
Wireshark - print_hex_data_buffer / print_packet Use-After-Free
Wireshark - Improper Input Validation
CVSS 5.5
Wireshark - Improper Input Validation
CVSS 5.5
Wireshark - iseries_parse_packet Heap Buffer Overflow
Wireshark - hiqnet_display_data Static Out-of-Bounds Read
Wireshark - getRate Stack Out-of-Bounds Read
Wireshark - Memory Corruption
CVSS 5.5
Wireshark - Improper Input Validation
CVSS 5.5
Wireshark - ett_zbee_zcl_pwr_prof_enphases Static Out-of-Bounds Read
Wireshark - erf_meta_read_tag SIGSEGV
Wireshark - Improper Input Validation
CVSS 5.5
Wireshark - dissect_tds7_colmetadata_token Stack Buffer Overflow
Wireshark - dissect_pktc_rekey Heap Out-of-Bounds Read
Wireshark - dissect_oml_attrs Static Out-of-Bounds Read