CVEs Discovered
Advisories Published
Vendors Notified
PoCs Released
Responsible Disclosure Policy: All vulnerabilities documented here have been reported to the affected vendors and patches have been made available before public disclosure. Proof-of-concept code is published only after a reasonable disclosure window. If you are a vendor with questions about a reported vulnerability, please reach out directly.
Research Entries — Template

[Product Name] — Buffer Overflow in [Component]

Critical
CVE-XXXX-XXXXX Discovered: YYYY-MM-DD Disclosed: YYYY-MM-DD CVSS: 9.8

[Detailed technical description of the vulnerability, including the root cause, affected versions, and impact. Describe the attack vector and any prerequisites for exploitation.]

Buffer Overflow Remote Code Execution Windows

[Product Name] — Use-After-Free in [Module]

High
CVE-XXXX-XXXXX Discovered: YYYY-MM-DD Disclosed: YYYY-MM-DD CVSS: 8.1

[Description of the use-after-free condition, how the dangling pointer is created, and the exploitation methodology used to achieve code execution.]

Use-After-Free Heap Corruption Privilege Escalation

[Product Name] — Integer Overflow Leading to Heap Corruption

Medium
CVE-XXXX-XXXXX Discovered: YYYY-MM-DD Disclosed: YYYY-MM-DD CVSS: 6.5

[Description of the integer overflow condition, how it leads to an undersized allocation and subsequent heap corruption. Include details on reliability and exploit constraints.]

Integer Overflow Heap Corruption Denial of Service