<?xml version="1.0" encoding="UTF-8"?>
<response>

<lst name="responseHeader">
  <lst name="params">
    <str name="q">*:*</str>
    <str name="defType">edismax</str>
    <str name="qf">url_paths_sxt^3.0 synonyms_sxt^0.5 title^5.0 text_t^1.0 host_s^6.0 h1_txt^5.0 url_file_name_tokens_t^4.0 h2_txt^3.0 keywords^2.0 description_txt^1.5 author^1.0</str>
    <str name="start">0</str>
    <str name="rows">3</str>
    <arr name="bq">
      <str>crawldepth_i:0^0.8</str>
      <str>crawldepth_i:1^0.4</str>
    </arr>
  </lst>
  <int name="status">0</int>
  <int name="QTime">1</int>
</lst>
<result name="response" numFound="25972" start="0">
  <doc>
    <str name="id">JTBGwl0jvnF5</str>
    <str name="host_id_s">0jvnF5</str>
    <str name="sku">https://www.exploit-db.com/</str>
    <str name="host_s">www.exploit-db.com</str>
    <str name="host_organization_s">exploit-db</str>
    <int name="url_chars_i">27</int>
    <str name="url_protocol_s">https</str>
    <int name="url_paths_count_i">0</int>
    <arr name="content_type">
      <str>text/html</str>
    </arr>
    <int name="crawldepth_i">0</int>
    <arr name="collection_sxt">
      <str>user</str>
    </arr>
    <arr name="title">
      <str>Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers</str>
    </arr>
    <arr name="description_txt">
      <str>The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.</str>
    </arr>
    <date name="last_modified">2025-07-22T01:14:56Z</date>
    <int name="dates_in_content_count_i">0</int>
    <str name="keywords">exploits  shellcode security papers exploit tutorials Windows Linux remote web applications local poc guides</str>
    <bool name="http_unique_b">false</bool>
    <bool name="www_unique_b">true</bool>
    <long name="exact_signature_l">-8302206794375341798</long>
    <bool name="exact_signature_unique_b">true</bool>
    <long name="fuzzy_signature_l">766194630319196084</long>
    <bool name="fuzzy_signature_unique_b">true</bool>
    <arr name="icons_protocol_sxt">
      <str>000-https</str>
    </arr>
    <arr name="icons_urlstub_sxt">
      <str>www.exploit-db.com/favicon.ico</str>
    </arr>
    <arr name="icons_rel_sxt">
      <str>icon apple-touch-icon</str>
    </arr>
    <arr name="icons_sizes_sxt">
      <str>76x76</str>
    </arr>
    <arr name="h1_txt">
      <str>Exploit Database</str>
    </arr>
    <arr name="h5_txt">
      <str>About The Exploit Database</str>
      <str>OffSec Resources</str>
      <str>Search The Exploit Database</str>
    </arr>
    <arr name="bold_txt">
      <str>Clear</str>
      <str>Solutions</str>
      <str>Sites</str>
      <str>Links</str>
      <str>Databases</str>
    </arr>
    <int name="imagescount_i">3</int>
    <arr name="images_protocol_sxt">
      <str>000-https</str>
      <str>001-https</str>
      <str>002-https</str>
    </arr>
    <arr name="images_urlstub_sxt">
      <str>www.exploit-db.com/images/spider-white.png</str>
      <str>www.exploit-db.com/images/edb-logo.png</str>
      <str>www.exploit-db.com/images/offsec-logo.png</str>
    </arr>
    <arr name="images_alt_sxt">
      <str>Exploit Database</str>
      <str>Exploit Database</str>
      <str>OffSec</str>
    </arr>
    <arr name="images_height_val">
      <int>-1</int>
      <int>60</int>
      <int>-1</int>
    </arr>
    <arr name="images_width_val">
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
    </arr>
    <str name="images_text_t">www exploit db com images spider white png Exploit Database edb logo offsec OffSec</str>
    <int name="responsetime_i">124</int>
    <int name="wordcount_i">1589</int>
    <int name="linkscount_i">34</int>
    <int name="linksnofollowcount_i">0</int>
    <int name="inboundlinkscount_i">18</int>
    <int name="outboundlinkscount_i">16</int>
    <arr name="inboundlinks_protocol_sxt">
      <str>000-https</str>
      <str>001-https</str>
      <str>002-https</str>
      <str>003-https</str>
      <str>004-https</str>
      <str>005-https</str>
      <str>006-https</str>
      <str>007-https</str>
      <str>008-https</str>
      <str>009-https</str>
      <str>010-https</str>
      <str>011-https</str>
      <str>012-https</str>
      <str>013-https</str>
      <str>014-https</str>
      <str>015-https</str>
      <str>016-https</str>
      <str>017-https</str>
    </arr>
    <arr name="inboundlinks_urlstub_sxt">
      <str>www.exploit-db.com/manifest.json</str>
      <str>www.exploit-db.com/</str>
      <str>www.exploit-db.com/google-hacking-database</str>
      <str>www.exploit-db.com/papers</str>
      <str>www.exploit-db.com/shellcodes</str>
      <str>www.exploit-db.com/search</str>
      <str>www.exploit-db.com/searchsploit</str>
      <str>www.exploit-db.com/submit</str>
      <str>www.exploit-db.com/exploit-database-statistics</str>
      <str>www.exploit-db.com/about-exploit-db</str>
      <str>www.exploit-db.com/history</str>
      <str>www.exploit-db.com/faq</str>
      <str>www.exploit-db.com/serchsploit</str>
      <str>www.exploit-db.com/statistics</str>
      <str>www.exploit-db.com/rss.xml</str>
      <str>www.exploit-db.com/terms</str>
      <str>www.exploit-db.com/privacy</str>
      <str>www.exploit-db.com/cookies</str>
    </arr>
    <arr name="inboundlinks_anchortext_txt">
      <str/>
      <str>&amp;nbsp;</str>
      <str>GHDB</str>
      <str>Papers</str>
      <str>Shellcodes</str>
      <str>Search EDB</str>
      <str>SearchSploit Manual</str>
      <str>Submissions</str>
      <str>Stats</str>
      <str>About Exploit-DB</str>
      <str>Exploit-DB History</str>
      <str>FAQ</str>
      <str>SearchSploit Manual</str>
      <str>Exploit Statistics</str>
      <str/>
      <str>Terms</str>
      <str>Privacy</str>
      <str>Cookies</str>
    </arr>
    <arr name="outboundlinks_protocol_sxt">
      <str>000-https</str>
      <str>001-https</str>
      <str>002-https</str>
      <str>003-https</str>
      <str>004-https</str>
      <str>005-https</str>
      <str>006-https</str>
      <str>007-https</str>
      <str>008-https</str>
      <str>009-https</str>
      <str>010-https</str>
      <str>011-https</str>
      <str>013-https</str>
      <str>014-https</str>
      <str>015-https</str>
    </arr>
    <arr name="outboundlinks_urlstub_sxt">
      <str>www.offsec.com/</str>
      <str>www.offsec.com/courses-and-certifications/</str>
      <str>www.kali.org/</str>
      <str>www.offsec.com/learn/</str>
      <str>www.vulnhub.com/</str>
      <str>www.offsec.com/cyber-range/</str>
      <str>www.offsec.com/labs/</str>
      <str>www.offsec.com/penetration-testing/</str>
      <str>twitter.com/exploitdb</str>
      <str>www.facebook.com/ExploitDB</str>
      <str>gitlab.com/exploit-database/exploitdb</str>
      <str>www.offsec.com/community-projects/</str>
      <str>cve.mitre.org/data/refs/refmap/source-EXPLOIT-DB.html</str>
      <str>www.defcon.org/html/links/dc-archives/dc-13-archive.html</str>
      <str>www.bing.com/</str>
      <str>github.com/</str>
    </arr>
    <arr name="outboundlinks_anchortext_txt">
      <str>Online Training</str>
      <str>Courses and Certifications</str>
      <str>Kali Linux</str>
      <str>Learn Subscriptions</str>
      <str>VulnHub</str>
      <str>OffSec Cyber Range</str>
      <str>Proving Grounds</str>
      <str>Penetration Testing Services</str>
      <str/>
      <str/>
      <str/>
      <str>OffSec</str>
      <str>CVE
                            compliant</str>
      <str>DEFCON 13</str>
      <str>Bing</str>
      <str>GitHub</str>
    </arr>
    <str name="charset_s">UTF-8</str>
    <int name="httpstatus_i">200</int>
    <date name="load_date_dt">2025-07-22T01:14:56.437Z</date>
    <date name="fresh_date_dt">2025-07-22T01:14:56.655Z</date>
    <str name="language_s">en</str>
    <int name="size_i">172658</int>
    <int name="audiolinkscount_i">0</int>
    <int name="videolinkscount_i">0</int>
    <int name="applinkscount_i">0</int>
    <int name="references_i">7</int>
    <int name="references_internal_i">0</int>
    <int name="references_external_i">7</int>
    <int name="references_exthosts_i">2</int>
    <int name="host_extent_i">-1</int>
    <long name="_version_">1838307760078323712</long>
    <str name="text_t">Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers. Exploit Database Exploits GHDB Papers Shellcodes Search EDB SearchSploit Manual Submissions Online Training Stats. About Us. About Exploit-DB Exploit-DB History FAQ Search. Type. Clear. dos. local. remote. webapps. hardware. Platform. Clear. AIX. Alpha. Android. ARM. ASHX. ASP. ASPX. AtheOS. BeOS. BSD. BSDi_x86. BSD_PPC. BSD_x86. CFM. CGI. eZine. FreeBSD. FreeBSD_x86. FreeBSD_x86-64. Generator. Go. Hardware. HP-UX. Immunix. iOS. IRIX. Java. JSON. JSP. Linux. Linux_CRISv32. Linux_MIPS. Linux_PPC. Linux_SPARC. Linux_x86. Linux_x86-64. Lua. macOS. Magazine. MINIX. Multiple. NetBSD_x86. Netware. NodeJS. Novell. OpenBSD. OpenBSD_x86. OSX. OSX_PPC. Palm_OS. Perl. PHP. Plan9. Python. Python2. Python3. QNX. Ruby. SCO. SCO_x86. Solaris. Solaris_MIPS. Solaris_SPARC. Solaris_x86. SuperH_SH4. System_z. Tru64. TypeScript. ULTRIX. Unix. UnixWare. VxWorks. watchOS. Windows. Windows_x86. Windows_x86-64. XML. Author. Clear. Port. Clear. 14. 21. 22. 23. 25. 42. 49. 53. 66. 69. 70. 79. 80. 81. 102. 105. 110. 111. 113. 119. 123. 135. 139. 143. 161. 162. 164. 383. 389. 402. 406. 411. 443. 444. 445. 446. 502. 504. 513. 514. 515. 532. 548. 554. 555. 617. 623. 631. 655. 689. 783. 787. 808. 873. 888. 901. 998. 1000. 1040. 1089. 1099. 1100. 1114. 1120. 1194. 1235. 1471. 1521. 1533. 1581. 1589. 1604. 1617. 1723. 1743. 1761. 1812. 1858. 1861. 1900. 1947. 2000. 2022. 2049. 2100. 2103. 2121. 2125. 2181. 2242. 2315. 2375. 2380. 2381. 2401. 2480. 2525. 2640. 2810. 2812. 2947. 2954. 2990. 3000. 3030. 3050. 3052. 3128. 3129. 3181. 3200. 3217. 3306. 3333. 3378. 3389. 3460. 3465. 3500. 3535. 3632. 3690. 3790. 3814. 3817. 4000. 4002. 4070. 4081. 4105. 4111. 4322. 4343. 4434. 4444. 4501. 4555. 4592. 4661. 4750. 4848. 5000. 5060. 5061. 5080. 5081. 5093. 5151. 5180. 5247. 5250. 5272. 5308. 5432. 5466. 5554. 5555. 5600. 5655. 5666. 5800. 5803. 5814. 5858. 5900. 5984. 6066. 6070. 6080. 6082. 6101. 6112. 6129. 6379. 6502. 6503. 6660. 6667. 7001. 7002. 7070. 7071. 7080. 7100. 7144. 7210. 7272. 7290. 7426. 7443. 7510. 7547. 7649. 7770. 7777. 7778. 7787. 7879. 7902. 8000. 8001. 8002. 8004. 8008. 8020. 8022. 8023. 8028. 8030. 8080. 8081. 8082. 8088. 8090. 8181. 8300. 8400. 8443. 8445. 8473. 8500. 8585. 8619. 8800. 8812. 8839. 8880. 8888. 9000. 9001. 9002. 9080. 9090. 9091. 9100. 9124. 9200. 9251. 9256. 9443. 9447. 9784. 9788. 9855. 9876. 9900. 9987. 9993. 9999. 10000. 10001. 10080. 10202. 10203. 10443. 10616. 11000. 11211. 11460. 12203. 12221. 12345. 12397. 12401. 13327. 13701. 13722. 13838. 16992. 18821. 18881. 19000. 19810. 19813. 20000. 20002. 20010. 20031. 20111. 20171. 22003. 23423. 25672. 26000. 27015. 27700. 28015. 30000. 30303. 31337. 32400. 32674. 32764. 34205. 37215. 37777. 37848. 38292. 40007. 41523. 44334. 46824. 48080. 49152. 50000. 50496. 52311. 52789. 52869. 52986. 53413. 54345. 54890. 55554. 55555. 56380. 57772. 58080. 62514. Tag. Clear. Authentication Bypass / Credentials Bypass (AB/CB). Buffer Overflow. Bug Report. Client Side. Code Injection. Command Injection. Console. Cross-Site Request Forgery (CSRF). Cross-Site Scripting (XSS). Denial of Service (DoS). Deserialization. File Inclusion (LFI/RFI). Heap Overflow. Integer Overflow. Local. Malware. Metasploit Framework (MSF). NULL Pointer Dereference. Object Injection. Out Of Bounds. Pwn2Own. Race Condition. Remote. Server-Side Request Forgery (SSRF). SQL Injection (SQLi). Traversal. Type Confusion. Use After Free (UAF). WordPress Core. WordPress Plugin. XML External Entity (XXE). Advanced. Verified. Has App. Filters. Reset All. Filters. Reset All. Date. D. A. V. Title. Type. Platform. Author. This site requires JavaScript. Databases. Links. Sites. Solutions. Exploits Search Exploit-DB OffSec Courses and Certifications Google Hacking Submit Entry Kali Linux Learn Subscriptions Papers SearchSploit Manual VulnHub OffSec Cyber Range Shellcodes Exploit Statistics Proving Grounds Penetration Testing Services Databases Exploits Google Hacking Papers Shellcodes Links Search Exploit-DB Submit Entry SearchSploit Manual Exploit Statistics Sites OffSec Kali Linux VulnHub Solutions Courses and Certifications Learn Subscriptions OffSec Cyber Range Proving Grounds Penetration Testing Services Exploit Database by OffSec Terms Privacy About Us FAQ Cookies ©. OffSec Services Limited 2025. All rights reserved. About The Exploit Database. ×. The Exploit Database is maintained by. OffSec , an information security training company that provides various. Information Security Certifications as well as high end. penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec. The Exploit Database is a. CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Our aim is to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away. The. Google Hacking Database (GHDB) is a categorized index of Internet search engine queries designed to uncover interesting, and usually sensitive, information made publicly available on the Internet. In most cases, this information was never meant to be made public but due to any number of factors this information was linked in a web document that was crawled by a search engine that subsequently followed that link and indexed the sensitive information. The process known as “Google Hacking” was popularized in 2000 by Johnny Long, a professional hacker, who began cataloging these queries in a database known as the Google Hacking Database. His initial efforts were amplified by countless hours of community member effort, documented in the book Google Hacking For Penetration Testers and popularised by a barrage of media attention and Johnny’s talks on the subject such as this early talk recorded at. DEFCON 13 . Johnny coined the term “Googledork” to refer to “a foolish or inept person as revealed by Google“. This was meant to draw attention to the fact that this was not a “Google problem” but rather the result of an often unintentional misconfiguration on the part of a user or a program installed by the user. Over time, the term “dork” became shorthand for a search query that located sensitive information and “dorks” were included with may web application vulnerability releases to show examples of vulnerable web sites. After nearly a decade of hard work by the community, Johnny turned the GHDB over to. OffSec in November 2010, and it is now maintained as an extension of the. Exploit Database . Today, the GHDB includes searches for other online search engines such as. Bing , and other online repositories like. GitHub , producing different, yet equally valuable results. Close. OffSec Resources. ×. Databases. Links. Sites. Solutions. Exploits Search Exploit-DB OffSec Courses and Certifications Google Hacking Submit Entry Kali Linux Learn Subscriptions Papers SearchSploit Manual VulnHub OffSec Cyber Range Proving Grounds Shellcodes Exploit Statistics Proving Grounds Penetration Testing Services Close. Search The Exploit Database. ×. Title. CVE. Type. dos. local. remote. shellcode. papers. webapps. hardware. Platform. AIX. ASP. BSD. BSD_PPC. BSD_x86. BSDi_x86. CGI. FreeBSD. FreeBSD_x86. FreeBSD_x86-64. Generator. Hardware. HP-UX. IRIX. JSP. Linux. Linux_MIPS. Linux_PPC. Linux_SPARC. Linux_x86. Linux_x86-64. MINIX. Multiple. NetBSD_x86. Novell. OpenBSD. OpenBSD_x86. OSX_PPC. OSX. PHP. Plan9. QNX. SCO. SCO_x86. Solaris. Solaris_SPARC. Solaris_x86. Tru64. ULTRIX. Unix. UnixWare. Windows_x86. Windows_x86-64. Windows. ARM. CFM. Netware. SuperH_SH4. Java. BeOS. Immunix. Palm_OS. AtheOS. iOS. Android. XML. Perl. Python. System_z. JSON. ASHX. Ruby. ASPX. macOS. Linux_CRISv32. eZine. Magazine. NodeJS. Alpha. Solaris_MIPS. Lua. watchOS. VxWorks. Python2. Python3. TypeScript. Go. Author. Content. Port. 14. 21. 22. 23. 25. 42. 49. 53. 66. 69. 70. 79. 80. 81. 102. 105. 110. 111. 113. 119. 123. 135. 139. 143. 161. 162. 164. 383. 389. 402. 406. 411. 443. 444. 445. 446. 502. 504. 513. 514. 515. 532. 548. 554. 555. 617. 623. 631. 655. 689. 783. 787. 808. 873. 888. 901. 998. 1000. 1040. 1089. 1099. 1100. 1114. 1120. 1194. 1235. 1471. 1521. 1533. 1581. 1589. 1604. 1617. 1723. 1743. 1761. 1812. 1858. 1861. 1900. 1947. 2000. 2022. 2049. 2100. 2103. 2121. 2125. 2181. 2242. 2315. 2375. 2380. 2381. 2401. 2480. 2525. 2640. 2810. 2812. 2947. 2954. 2990. 3000. 3030. 3050. 3052. 3128. 3129. 3181. 3200. 3217. 3306. 3333. 3378. 3389. 3460. 3465. 3500. 3535. 3632. 3690. 3790. 3814. 3817. 4000. 4002. 4070. 4081. 4105. 4111. 4322. 4343. 4434. 4444. 4501. 4555. 4592. 4661. 4750. 4848. 5000. 5060. 5061. 5080. 5081. 5093. 5151. 5180. 5247. 5250. 5272. 5308. 5432. 5466. 5554. 5555. 5600. 5655. 5666. 5800. 5803. 5814. 5858. 5900. 5984. 6066. 6070. 6080. 6082. 6101. 6112. 6129. 6379. 6502. 6503. 6660. 6667. 7001. 7002. 7070. 7071. 7080. 7100. 7144. 7210. 7272. 7290. 7426. 7443. 7510. 7547. 7649. 7770. 7777. 7778. 7787. 7879. 7902. 8000. 8001. 8002. 8004. 8008. 8020. 8022. 8023. 8028. 8030. 8080. 8081. 8082. 8088. 8090. 8181. 8300. 8400. 8443. 8445. 8473. 8500. 8585. 8619. 8800. 8812. 8839. 8880. 8888. 9000. 9001. 9002. 9080. 9090. 9091. 9100. 9124. 9200. 9251. 9256. 9443. 9447. 9784. 9788. 9855. 9876. 9900. 9987. 9993. 9999. 10000. 10001. 10080. 10202. 10203. 10443. 10616. 11000. 11211. 11460. 12203. 12221. 12345. 12397. 12401. 13327. 13701. 13722. 13838. 16992. 18821. 18881. 19000. 19810. 19813. 20000. 20002. 20010. 20031. 20111. 20171. 22003. 23423. 25672. 26000. 27015. 27700. 28015. 30000. 30303. 31337. 32400. 32674. 32764. 34205. 37215. 37777. 37848. 38292. 40007. 41523. 44334. 46824. 48080. 49152. 50000. 50496. 52311. 52789. 52869. 52986. 53413. 54345. 54890. 55554. 55555. 56380. 57772. 58080. 62514. Tag. WordPress Core. Metasploit Framework (MSF). WordPress Plugin. SQL Injection (SQLi). Cross-Site Scripting (XSS). File Inclusion (LFI/RFI). Cross-Site Request Forgery (CSRF). Denial of Service (DoS). Code Injection. Command Injection. Authentication Bypass / Credentials Bypass (AB/CB). Client Side. Use After Free (UAF). Out Of Bounds. Remote. Local. XML External Entity (XXE). Integer Overflow. Server-Side Request Forgery (SSRF). Race Condition. NULL Pointer Dereference. Malware. Buffer Overflow. Heap Overflow. Type Confusion. Object Injection. Bug Report. Console. Pwn2Own. Traversal. Deserialization. Verified. Has App. No Metasploit. Search.</str></doc>
  <doc>
    <str name="id">NqytAlr3ZE_g</str>
    <str name="host_id_s">r3ZE_g</str>
    <str name="sku">https://www.zero-day.cz/</str>
    <str name="host_s">www.zero-day.cz</str>
    <str name="host_organization_s">zero-day</str>
    <int name="url_chars_i">24</int>
    <str name="url_protocol_s">https</str>
    <int name="url_paths_count_i">0</int>
    <arr name="content_type">
      <str>text/html</str>
    </arr>
    <int name="crawldepth_i">0</int>
    <arr name="collection_sxt">
      <str>user</str>
    </arr>
    <arr name="title">
      <str>Free zero-day vulnerability tracking service - zero-day.cz</str>
    </arr>
    <arr name="description_txt">
      <str>Free zero-day (0day) vulnerability tracking project.</str>
    </arr>
    <str name="author">Valerii Marchuk, Cybersecurity Help s.r.o.</str>
    <arr name="author_sxt">
      <str>Valerii Marchuk, Cybersecurity Help s.r.o.</str>
    </arr>
    <date name="last_modified">2025-07-22T01:17:09Z</date>
    <int name="dates_in_content_count_i">4</int>
    <arr name="dates_in_content_dts">
      <date>2025-07-20T00:00:00Z</date>
      <date>2025-07-15T00:00:00Z</date>
      <date>2025-07-01T00:00:00Z</date>
      <date>2025-06-26T00:00:00Z</date>
    </arr>
    <str name="keywords">IT security intelligence services vulnerability exploit penetration testing</str>
    <bool name="http_unique_b">false</bool>
    <bool name="www_unique_b">true</bool>
    <long name="exact_signature_l">-7175450493148401619</long>
    <bool name="exact_signature_unique_b">true</bool>
    <long name="fuzzy_signature_l">6594876029855819234</long>
    <bool name="fuzzy_signature_unique_b">true</bool>
    <arr name="icons_protocol_sxt">
      <str>000-https</str>
    </arr>
    <arr name="icons_urlstub_sxt">
      <str>www.zero-day.cz/upload/favic0n.png</str>
    </arr>
    <arr name="icons_rel_sxt">
      <str>icon</str>
    </arr>
    <arr name="icons_sizes_sxt">
      <str/>
    </arr>
    <arr name="h1_txt">
      <str>Latest zero-days Total: 881, in 2025: Zero-days 65, candidates: 0</str>
    </arr>
    <arr name="h2_txt">
      <str>About zero-day vulnerabilities</str>
    </arr>
    <arr name="h3_txt">
      <str>Remote code execution in Microsoft SharePoint Server CVE-2025-53770</str>
      <str>Multiple vulnerabilities in Google Chrome CVE-2025-6558</str>
      <str>Remote code execution in Google Chrome CVE-2025-6554</str>
      <str>Remote denial of service in NetScaler Gateway and NetScaler ADC CVE-2025-6543</str>
    </arr>
    <int name="imagescount_i">1</int>
    <arr name="images_protocol_sxt">
      <str>000-https</str>
    </arr>
    <arr name="images_urlstub_sxt">
      <str>www.zero-day.cz/local/templates/0day/images/cshelp-logo.png</str>
    </arr>
    <arr name="images_alt_sxt">
      <str>CyberSecurity-Help</str>
    </arr>
    <arr name="images_height_val">
      <int>-1</int>
    </arr>
    <arr name="images_width_val">
      <int>-1</int>
    </arr>
    <str name="images_text_t">www zero day cz local templates 0day images cshelp logo png CyberSecurity-Help</str>
    <int name="responsetime_i">498</int>
    <str name="text_t">Free zero-day vulnerability tracking service - zero-day.cz. Toggle navigation. Research Database Subscription About Latest zero-days. Total: 881, in 2025: Zero-days 65, candidates: 0. Remote code execution in Microsoft SharePoint Server CVE-2025-53770. 2025-07-20. Not patched. Multiple vulnerabilities in Google Chrome CVE-2025-6558. 2025-07-15. 2025-07-15. Remote code execution in Google Chrome CVE-2025-6554. 2025-07-01. 2025-07-01. Remote denial of service in NetScaler Gateway and NetScaler ADC CVE-2025-6543. 2025-06-26. 2025-06-26. About zero-day vulnerabilities. Zero-day vulnerability is an undisclosed vulnerability in software that hackers can exploit to compromise computer programs, gain unauthorized access to sensitive data, penetrate networks, etc. We consider vulnerability a zero-day when there is no solution provided from software vendor and the vulnerability is being actively exploited by malicious actors. Zero-day candidate is a potential zero-day vulnerability in software which might have been used in targeted attacks, however there is no evidence to support this suggestion.</str>
    <int name="wordcount_i">142</int>
    <int name="linkscount_i">10</int>
    <int name="linksnofollowcount_i">0</int>
    <int name="inboundlinkscount_i">9</int>
    <int name="outboundlinkscount_i">1</int>
    <arr name="inboundlinks_protocol_sxt">
      <str>000-https</str>
      <str>001-https</str>
      <str>002-https</str>
      <str>003-https</str>
      <str>004-https</str>
      <str>005-https</str>
      <str>006-https</str>
      <str>007-https</str>
      <str>008-https</str>
    </arr>
    <arr name="inboundlinks_urlstub_sxt">
      <str>www.zero-day.cz/</str>
      <str>www.zero-day.cz/research/</str>
      <str>www.zero-day.cz/database/</str>
      <str>www.zero-day.cz/subscription/</str>
      <str>www.zero-day.cz/about/</str>
      <str>www.zero-day.cz/database/1017/</str>
      <str>www.zero-day.cz/database/1016/</str>
      <str>www.zero-day.cz/database/1015/</str>
      <str>www.zero-day.cz/database/1014/</str>
    </arr>
    <arr name="inboundlinks_anchortext_txt">
      <str/>
      <str>Research</str>
      <str>Database</str>
      <str>Subscription</str>
      <str>About</str>
      <str>Remote code execution in Microsoft SharePoint Server			 
			 CVE-2025-53770</str>
      <str>Multiple vulnerabilities in Google Chrome			 
			 CVE-2025-6558</str>
      <str>Remote code execution in Google Chrome			 
			 CVE-2025-6554</str>
      <str>Remote denial of service in NetScaler Gateway and NetScaler ADC			 
			 CVE-2025-6543</str>
    </arr>
    <arr name="outboundlinks_protocol_sxt">
      <str>000-https</str>
    </arr>
    <arr name="outboundlinks_urlstub_sxt">
      <str>www.cybersecurity-help.cz/</str>
    </arr>
    <arr name="outboundlinks_anchortext_txt">
      <str/>
    </arr>
    <str name="charset_s">UTF-8</str>
    <int name="httpstatus_i">200</int>
    <date name="load_date_dt">2025-07-22T01:17:09.509Z</date>
    <date name="fresh_date_dt">2025-07-22T01:17:09.763Z</date>
    <str name="language_s">en</str>
    <int name="size_i">11843</int>
    <int name="audiolinkscount_i">0</int>
    <int name="videolinkscount_i">0</int>
    <int name="applinkscount_i">0</int>
    <int name="references_i">0</int>
    <int name="references_internal_i">0</int>
    <int name="references_external_i">0</int>
    <int name="references_exthosts_i">0</int>
    <int name="host_extent_i">-1</int>
    <long name="_version_">1838307899614429184</long></doc>
  <doc>
    <str name="id">w_I3BsMQ1A35</str>
    <str name="host_id_s">MQ1A35</str>
    <str name="sku">https://packetstorm.news/</str>
    <str name="host_s">packetstorm.news</str>
    <str name="host_organization_s">packetstorm</str>
    <int name="url_chars_i">25</int>
    <str name="url_protocol_s">https</str>
    <int name="url_paths_count_i">0</int>
    <arr name="content_type">
      <str>text/html</str>
    </arr>
    <int name="crawldepth_i">0</int>
    <arr name="collection_sxt">
      <str>user</str>
    </arr>
    <arr name="title">
      <str>Packet Storm</str>
    </arr>
    <arr name="description_txt">
      <str>Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers</str>
    </arr>
    <date name="last_modified">2025-07-22T01:18:50Z</date>
    <int name="dates_in_content_count_i">3</int>
    <arr name="dates_in_content_dts">
      <date>2025-07-21T00:00:00Z</date>
      <date>2025-03-03T00:00:00Z</date>
      <date>2025-07-16T00:00:00Z</date>
    </arr>
    <str name="keywords">security exploit advisory whitepaper xss csrf overflow scanner vulnerability rce</str>
    <bool name="http_unique_b">false</bool>
    <bool name="www_unique_b">false</bool>
    <long name="exact_signature_l">4683821689008070764</long>
    <bool name="exact_signature_unique_b">true</bool>
    <long name="fuzzy_signature_l">4689721233583849823</long>
    <bool name="fuzzy_signature_unique_b">true</bool>
    <arr name="icons_protocol_sxt">
      <str>000-https</str>
    </arr>
    <arr name="icons_urlstub_sxt">
      <str>packetstorm.news/icons/favicon.ico</str>
    </arr>
    <arr name="icons_rel_sxt">
      <str>icon</str>
    </arr>
    <arr name="icons_sizes_sxt">
      <str/>
    </arr>
    <arr name="bold_txt">
      <str>Results</str>
      <str>Answers</str>
      <str>How do you feel about the term zero trust?</str>
      <str>Account</str>
      <str>Services</str>
      <str>System</str>
    </arr>
    <int name="imagescount_i">63</int>
    <arr name="images_protocol_sxt">
      <str>000-https</str>
      <str>001-https</str>
      <str>002-https</str>
      <str>003-https</str>
      <str>004-https</str>
      <str>005-https</str>
      <str>006-https</str>
      <str>007-https</str>
      <str>008-https</str>
      <str>009-https</str>
      <str>010-https</str>
      <str>011-https</str>
      <str>012-https</str>
      <str>013-https</str>
      <str>014-https</str>
      <str>015-https</str>
      <str>016-https</str>
      <str>017-https</str>
      <str>018-https</str>
      <str>019-https</str>
      <str>020-https</str>
      <str>021-https</str>
      <str>022-https</str>
      <str>023-https</str>
      <str>024-https</str>
      <str>025-https</str>
      <str>026-https</str>
      <str>027-https</str>
      <str>028-https</str>
      <str>029-https</str>
      <str>030-https</str>
      <str>031-https</str>
      <str>032-https</str>
      <str>033-https</str>
      <str>034-https</str>
      <str>035-https</str>
      <str>036-https</str>
      <str>037-https</str>
      <str>038-https</str>
      <str>039-https</str>
      <str>040-https</str>
      <str>041-https</str>
      <str>042-https</str>
      <str>043-https</str>
      <str>044-https</str>
      <str>045-https</str>
      <str>046-https</str>
      <str>047-https</str>
      <str>048-https</str>
      <str>049-https</str>
      <str>050-https</str>
      <str>051-https</str>
      <str>052-https</str>
      <str>053-https</str>
      <str>054-https</str>
      <str>055-https</str>
      <str>056-https</str>
      <str>057-https</str>
      <str>058-https</str>
      <str>059-https</str>
      <str>060-https</str>
      <str>061-https</str>
      <str>062-https</str>
    </arr>
    <arr name="images_urlstub_sxt">
      <str>packetstorm.news/logos/smalllogobeta.webp</str>
      <str>packetstorm.news/logos/smalllogobeta.webp</str>
      <str>packetstorm.news/logos/linegray.webp</str>
      <str>packetstorm.news/icons/icon-submissions.webp</str>
      <str>packetstorm.news/icons/icon-files.webp</str>
      <str>packetstorm.news/icons/icon-news.webp</str>
      <str>packetstorm.news/icons/icon-vote.webp</str>
      <str>packetstorm.news/icons/icon-help.webp</str>
      <str>packetstorm.news/icons/icon-api.webp</str>
      <str>packetstorm.news/icons/icon-advertise.webp</str>
      <str>packetstorm.news/icons/icon-contact.webp</str>
      <str>packetstorm.news/icons/icon-signup.webp</str>
      <str>packetstorm.news/icons/icon-login.webp</str>
      <str>packetstorm.news/icons/icon-submissions.webp</str>
      <str>packetstorm.news/icons/icon-files.webp</str>
      <str>packetstorm.news/icons/icon-news.webp</str>
      <str>packetstorm.news/icons/icon-vote.webp</str>
      <str>packetstorm.news/icons/icon-help.webp</str>
      <str>packetstorm.news/icons/icon-api.webp</str>
      <str>packetstorm.news/icons/icon-advertise.webp</str>
      <str>packetstorm.news/icons/icon-contact.webp</str>
      <str>packetstorm.news/icons/icon-signup.webp</str>
      <str>packetstorm.news/icons/icon-login.webp</str>
      <str>packetstorm.news/icons/downarrow.webp</str>
      <str>packetstorm.news/icons/rightarrow.webp</str>
      <str>packetstorm.news/icons/downarrow.webp</str>
      <str>packetstorm.news/img/store/ps-hat.webp</str>
      <str>packetstorm.news/img/store/ps-hoodie.webp</str>
      <str>packetstorm.news/img/store/ps-mousepad.webp</str>
      <str>packetstorm.news/img/store/ps-hat.webp</str>
      <str>packetstorm.news/img/store/ps-hoodie.webp</str>
      <str>packetstorm.news/img/store/ps-mousepad.webp</str>
      <str>packetstorm.news/img/store/ps-mug.webp</str>
      <str>packetstorm.news/img/store/ps-mug.webp</str>
      <str>packetstorm.news/img/store/ps-shirt.webp</str>
      <str>packetstorm.news/img/store/ps-phonecase.webp</str>
      <str>packetstorm.news/img/store/ps-shirt.webp</str>
      <str>packetstorm.news/img/store/ps-phonecase.webp</str>
      <str>packetstorm.news/icons/downarrow.webp</str>
      <str>packetstorm.news/uimg/adpic/large-2cf77ee543897ca0c41ae7ff1b418fcce7054ad6de5a6ca54fae5fff4ebefdfd.webp</str>
      <str>packetstorm.news/uimg/adpic/large-2cf77ee543897ca0c41ae7ff1b418fcce7054ad6de5a6ca54fae5fff4ebefdfd.webp</str>
      <str>packetstorm.news/icons/rightarrow.webp</str>
      <str>packetstorm.news/icons/rightarrow.webp</str>
      <str>packetstorm.news/icons/downarrow.webp</str>
      <str>packetstorm.news/icons/rightarrow.webp</str>
      <str>packetstorm.news/icons/downarrow.webp</str>
      <str>packetstorm.news/img/store/ps-hat.webp</str>
      <str>packetstorm.news/img/store/ps-hoodie.webp</str>
      <str>packetstorm.news/img/store/ps-mousepad.webp</str>
      <str>packetstorm.news/img/store/ps-hat.webp</str>
      <str>packetstorm.news/img/store/ps-hoodie.webp</str>
      <str>packetstorm.news/img/store/ps-mousepad.webp</str>
      <str>packetstorm.news/img/store/ps-mug.webp</str>
      <str>packetstorm.news/img/store/ps-mug.webp</str>
      <str>packetstorm.news/img/store/ps-shirt.webp</str>
      <str>packetstorm.news/img/store/ps-phonecase.webp</str>
      <str>packetstorm.news/img/store/ps-shirt.webp</str>
      <str>packetstorm.news/img/store/ps-phonecase.webp</str>
      <str>packetstorm.news/icons/downarrow.webp</str>
      <str>packetstorm.news/uimg/adpic/large-2cf77ee543897ca0c41ae7ff1b418fcce7054ad6de5a6ca54fae5fff4ebefdfd.webp</str>
      <str>packetstorm.news/uimg/adpic/large-2cf77ee543897ca0c41ae7ff1b418fcce7054ad6de5a6ca54fae5fff4ebefdfd.webp</str>
      <str>packetstorm.news/icons/rightarrow.webp</str>
      <str>packetstorm.news/icons/rightarrow.webp</str>
    </arr>
    <arr name="images_alt_sxt">
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str>Hat</str>
      <str>Hoodie</str>
      <str>Mousepad</str>
      <str>Hat</str>
      <str>Hoodie</str>
      <str>Mousepad</str>
      <str>Mug</str>
      <str>Mug</str>
      <str>Shirts</str>
      <str>Phonecase</str>
      <str>Shirts</str>
      <str>Phonecase</str>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
      <str>Hat</str>
      <str>Hoodie</str>
      <str>Mousepad</str>
      <str>Hat</str>
      <str>Hoodie</str>
      <str>Mousepad</str>
      <str>Mug</str>
      <str>Mug</str>
      <str>Shirts</str>
      <str>Phonecase</str>
      <str>Shirts</str>
      <str>Phonecase</str>
      <str/>
      <str/>
      <str/>
      <str/>
      <str/>
    </arr>
    <arr name="images_height_val">
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
    </arr>
    <arr name="images_width_val">
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
      <int>-1</int>
    </arr>
    <str name="images_text_t">packetstorm news logos smalllogobeta webp linegray icons icon submissions files vote help api advertise contact signup login downarrow rightarrow img store ps hat Hat hoodie Hoodie mousepad Mousepad mug Mug shirt Shirts phonecase Phonecase uimg adpic large 2cf77ee543897ca0c41ae7ff1b418fcce7054ad6de5a6ca54fae5fff4ebefdfd 2cf 77ee 543897ca 0c 41ae 7ff 1b 418fcce 7054ad 6de 5a 6ca 54fae 5fff 4ebefdfd</str>
    <int name="responsetime_i">1046</int>
    <int name="wordcount_i">1046</int>
    <int name="linkscount_i">43</int>
    <int name="linksnofollowcount_i">0</int>
    <int name="inboundlinkscount_i">29</int>
    <int name="outboundlinkscount_i">14</int>
    <arr name="inboundlinks_protocol_sxt">
      <str>000-https</str>
      <str>001-https</str>
      <str>002-https</str>
      <str>003-https</str>
      <str>004-https</str>
      <str>005-https</str>
      <str>006-https</str>
      <str>007-https</str>
      <str>008-https</str>
      <str>009-https</str>
      <str>010-https</str>
      <str>011-https</str>
      <str>012-https</str>
      <str>013-https</str>
      <str>014-https</str>
      <str>015-https</str>
      <str>016-https</str>
      <str>017-https</str>
      <str>018-https</str>
      <str>019-https</str>
      <str>020-https</str>
      <str>021-https</str>
      <str>022-https</str>
      <str>023-https</str>
      <str>024-https</str>
      <str>025-https</str>
      <str>026-https</str>
      <str>027-https</str>
      <str>028-https</str>
    </arr>
    <arr name="inboundlinks_urlstub_sxt">
      <str>packetstorm.news/</str>
      <str>packetstorm.news/help/view/4</str>
      <str>packetstorm.news/files/latest/1</str>
      <str>packetstorm.news/news/main/page/1</str>
      <str>packetstorm.news/polls/page/1</str>
      <str>packetstorm.news/help/</str>
      <str>packetstorm.news/help/view/1</str>
      <str>packetstorm.news/help/view/24</str>
      <str>packetstorm.news/help/view/11</str>
      <str>packetstorm.news/account/signup/</str>
      <str>packetstorm.news/account/login/</str>
      <str>packetstorm.news/help/view/4/</str>
      <str>packetstorm.news/account/signup</str>
      <str>packetstorm.news/account/login</str>
      <str>packetstorm.news/files/main/page/1</str>
      <str>packetstorm.news/changelog/</str>
      <str>packetstorm.news/files/id/207299/</str>
      <str>packetstorm.news/files/id/207298/</str>
      <str>packetstorm.news/files/id/207297/</str>
      <str>packetstorm.news/files/id/207296/</str>
      <str>packetstorm.news/files/id/207295/</str>
      <str>packetstorm.news/files/id/207294/</str>
      <str>packetstorm.news/files/id/207293/</str>
      <str>packetstorm.news/files/id/207292/</str>
      <str>packetstorm.news/files/id/207291/</str>
      <str>packetstorm.news/files/id/207290/</str>
      <str>packetstorm.news/tos/</str>
      <str>packetstorm.news/help/view/7</str>
      <str>packetstorm.news/help/view/6</str>
    </arr>
    <arr name="inboundlinks_anchortext_txt">
      <str/>
      <str>About</str>
      <str>Files</str>
      <str>News</str>
      <str>Vote</str>
      <str>Help</str>
      <str>API</str>
      <str>Advertise</str>
      <str>Contact</str>
      <str>Join</str>
      <str>Login</str>
      <str>About</str>
      <str>Join</str>
      <str>Login</str>
      <str>61 files added</str>
      <str>[ View Full Changelog ]</str>
      <str>Ubuntu Security Notice USN-7658-1</str>
      <str>Remote Mouse 3.303 Remote Code Execution</str>
      <str>Wifi Mouse 1.9.0.8 Unauthenticated Remote System Control</str>
      <str>Wifi Mouse 1.9.0.8 Remote Code Execution</str>
      <str>Mouse Agent Server 3.1 Unauthenticated Remote System Control</str>
      <str>LiveHelperChat 4.6.1 Cross Site Scripting</str>
      <str>Ubuntu Security Notice USN-7611-4</str>
      <str>Ai2 Insecure Direct Object Reference</str>
      <str>ChatPlayground.ai Cross Site Scripting / Insecure Direct Object Reference</str>
      <str>BarbarBaba 1.0 SQL Injection</str>
      <str>Terms</str>
      <str>Copyright</str>
      <str>Privacy</str>
    </arr>
    <arr name="outboundlinks_protocol_sxt">
      <str>000-https</str>
      <str>001-https</str>
      <str>002-https</str>
      <str>003-https</str>
      <str>004-https</str>
      <str>005-https</str>
      <str>006-https</str>
      <str>007-https</str>
      <str>008-https</str>
      <str>009-https</str>
      <str>010-https</str>
      <str>011-https</str>
      <str>012-https</str>
      <str>013-https</str>
    </arr>
    <arr name="outboundlinks_urlstub_sxt">
      <str>www.theregister.com/2025/07/19/idf_cyber_chief_iran/</str>
      <str>www.theregister.com/2025/07/20/uk_microsoft_snooping_russia/</str>
      <str>www.bleepingcomputer.com/news/security/dell-confirms-breach-of-test-lab-platform-by-world-leaks-extortion-group/</str>
      <str>www.bbc.com/news/articles/cx2gx28815wo</str>
      <str>arstechnica.com/tech-policy/2025/07/uk-backing-down-on-apple-encryption-backdoor-after-pressure-from-us/</str>
      <str>www.securityweek.com/microsoft-patches-toolshell-zero-days-exploited-to-hack-sharepoint-servers/</str>
      <str>www.infosecurity-magazine.com/news/crushftp-critical-vulnerability/</str>
      <str>www.securityweek.com/marketing-law-firms-say-data-breaches-impact-over-200000-people/</str>
      <str>www.securityweek.com/surveillance-firm-bypasses-ss7-protections-to-retrieve-user-location/</str>
      <str>www.theregister.com/2025/07/21/muddywaters_android_iran/</str>
      <str>bsky.app/profile/packetstorm.bsky.social</str>
      <str>x.com/packet_storm</str>
      <str>infosec.exchange/@packet_storm/</str>
      <str>www.rokasecurity.com/</str>
    </arr>
    <arr name="outboundlinks_anchortext_txt">
      <str>Ex-IDF Cyber Chief Talks Iran, Scattered Spider, and Why Social Engineering Worries Him More Than 0-Days</str>
      <str>UK Uncovers Novel Microsoft Snooping Malware, Blames and Sanctions GRU Cyberspies</str>
      <str>Dell Confirms Breach of Test Lab Platform by World Leaks Extortion Group</str>
      <str>Weak Password Allowed Hackers to Sink a 158-Year-Old Company</str>
      <str>UK Backing Down on Apple Encryption Backdoor after Pressure from US</str>
      <str>Microsoft Patches ToolShell Zero-Days Exploited to Hack SharePoint Servers</str>
      <str>New CrushFTP Critical Vulnerability Exploited in the Wild</str>
      <str>Marketing, Law Firms Say Data Breaches Impact over 200,000 People</str>
      <str>Surveillance Firm Bypasses SS7 Protections to Retrieve User Location</str>
      <str>Four New Android Spyware Samples Linked to Iran's Intel Agency</str>
      <str>BlueSky</str>
      <str>X</str>
      <str>Mastodon</str>
      <str>RokaSecurity</str>
    </arr>
    <str name="charset_s">UTF-8</str>
    <int name="httpstatus_i">200</int>
    <date name="load_date_dt">2025-07-22T01:18:50.499Z</date>
    <date name="fresh_date_dt">2025-07-22T01:18:50.748Z</date>
    <str name="language_s">en</str>
    <int name="size_i">48990</int>
    <int name="audiolinkscount_i">0</int>
    <int name="videolinkscount_i">0</int>
    <int name="applinkscount_i">0</int>
    <int name="references_i">60</int>
    <int name="references_internal_i">48</int>
    <int name="references_external_i">12</int>
    <int name="references_exthosts_i">1</int>
    <int name="host_extent_i">-1</int>
    <long name="_version_">1838308005511168000</long>
    <str name="text_t">Packet Storm. files. news. users. cve. files. news. users. cve. Command and Control. System. About Files News Vote Help Services. API Advertise Contact Account. Join Login System. About Files News Vote Help Services. API Advertise Contact Account. Join Login Storm Watch (. ). 2025-07-21:. 12 news articles added 2025-07-21:. 61 files added 2025-03-03:. 1 voting poll added 2025-07-21 (1753056000). Plenty of interesting files today as well as headlines. Friendly reminder that automating scraping of the site results in not only failure, but blocking at the perimeter. 2025-07-16 (1752624000). Bot activity will continue to be dropped as detected. If you don&amp;apos;t want your entire /12 blocked, please stop your crawls Microsoft. If anyone can afford API access, it&amp;apos;s you. Shameful. ... [ View Full Changelog ] Polls (. ). There&amp;apos;s quite a bit of hype regarding zero trust solutions in the industry. To Packet Storm, it&amp;apos;s just a repackaging of the thought strategy that should already be the driver behind information security initiatives, but what do we know? How do you feel about the term zero trust? Answers. Results. Isn&amp;apos;t zero trust already implied with the Principle of Least Privilege? 44%. It is a marketing term that gets us additional funding. 33%. If you need these solutions, you haven&amp;apos;t been doing your job. 11%. It&amp;apos;s what I give every site I visit on the Internet. 0%. It&amp;apos;s how I feel about my management&amp;apos;s philosophy on security. 0%. Don&amp;apos;t talk to strangers. 11%. Grab Gear (. ). Support Packet Storm by grabbing gear! Our online store is now open and ready to take your money! Advertise on Packet Storm (. ). Get your new product or service noticed on Packet Storm today! Placement on Packet Storm ensures the security community sees your announcement. Try it today! Get your new product or service noticed on Packet Storm today! Placement on Packet Storm ensures the security community sees your announcement. Try it today! Files (. ). Ubuntu Security Notice USN-7658-1 Posted: 2025-07-21. Remote Mouse 3.303 Remote Code Execution Posted: 2025-07-21. Wifi Mouse 1.9.0.8 Unauthenticated Remote System Control Posted: 2025-07-21. Wifi Mouse 1.9.0.8 Remote Code Execution Posted: 2025-07-21. Mouse Agent Server 3.1 Unauthenticated Remote System Control Posted: 2025-07-21. LiveHelperChat 4.6.1 Cross Site Scripting Posted: 2025-07-21. Ubuntu Security Notice USN-7611-4 Posted: 2025-07-21. Ai2 Insecure Direct Object Reference Posted: 2025-07-21. ChatPlayground.ai Cross Site Scripting / Insecure Direct Object Reference Posted: 2025-07-21. BarbarBaba 1.0 SQL Injection Posted: 2025-07-21. News (. ). Ex-IDF Cyber Chief Talks Iran, Scattered Spider, and Why Social Engineering Worries Him More Than 0-Days Posted: 2025-07-21. UK Uncovers Novel Microsoft Snooping Malware, Blames and Sanctions GRU Cyberspies Posted: 2025-07-21. Dell Confirms Breach of Test Lab Platform by World Leaks Extortion Group Posted: 2025-07-21. Weak Password Allowed Hackers to Sink a 158-Year-Old Company Posted: 2025-07-21. UK Backing Down on Apple Encryption Backdoor after Pressure from US Posted: 2025-07-21. Microsoft Patches ToolShell Zero-Days Exploited to Hack SharePoint Servers Posted: 2025-07-21. New CrushFTP Critical Vulnerability Exploited in the Wild Posted: 2025-07-21. Marketing, Law Firms Say Data Breaches Impact over 200,000 People Posted: 2025-07-21. Surveillance Firm Bypasses SS7 Protections to Retrieve User Location Posted: 2025-07-21. Four New Android Spyware Samples Linked to Iran's Intel Agency Posted: 2025-07-21. Storm Watch (. ). 2025-07-21:. 12 news articles added 2025-07-21:. 61 files added 2025-03-03:. 1 voting poll added 2025-07-21 (1753056000). Plenty of interesting files today as well as headlines. Friendly reminder that automating scraping of the site results in not only failure, but blocking at the perimeter. 2025-07-16 (1752624000). Bot activity will continue to be dropped as detected. If you don&amp;apos;t want your entire /12 blocked, please stop your crawls Microsoft. If anyone can afford API access, it&amp;apos;s you. Shameful. ... [ View Full Changelog ] Polls (. ). There&amp;apos;s quite a bit of hype regarding zero trust solutions in the industry. To Packet Storm, it&amp;apos;s just a repackaging of the thought strategy that should already be the driver behind information security initiatives, but what do we know? How do you feel about the term zero trust? Answers. Results. Isn&amp;apos;t zero trust already implied with the Principle of Least Privilege? 44%. It is a marketing term that gets us additional funding. 33%. If you need these solutions, you haven&amp;apos;t been doing your job. 11%. It&amp;apos;s what I give every site I visit on the Internet. 0%. It&amp;apos;s how I feel about my management&amp;apos;s philosophy on security. 0%. Don&amp;apos;t talk to strangers. 11%. Grab Gear (. ). Support Packet Storm by grabbing gear! Our online store is now open and ready to take your money! Advertise on Packet Storm (. ). Get your new product or service noticed on Packet Storm today! Placement on Packet Storm ensures the security community sees your announcement. Try it today! Get your new product or service noticed on Packet Storm today! Placement on Packet Storm ensures the security community sees your announcement. Try it today! Files (. ). Ubuntu Security Notice USN-7658-1 Posted: 2025-07-21. Remote Mouse 3.303 Remote Code Execution Posted: 2025-07-21. Wifi Mouse 1.9.0.8 Unauthenticated Remote System Control Posted: 2025-07-21. Wifi Mouse 1.9.0.8 Remote Code Execution Posted: 2025-07-21. Mouse Agent Server 3.1 Unauthenticated Remote System Control Posted: 2025-07-21. LiveHelperChat 4.6.1 Cross Site Scripting Posted: 2025-07-21. Ubuntu Security Notice USN-7611-4 Posted: 2025-07-21. Ai2 Insecure Direct Object Reference Posted: 2025-07-21. ChatPlayground.ai Cross Site Scripting / Insecure Direct Object Reference Posted: 2025-07-21. BarbarBaba 1.0 SQL Injection Posted: 2025-07-21. News (. ). Ex-IDF Cyber Chief Talks Iran, Scattered Spider, and Why Social Engineering Worries Him More Than 0-Days Posted: 2025-07-21. UK Uncovers Novel Microsoft Snooping Malware, Blames and Sanctions GRU Cyberspies Posted: 2025-07-21. Dell Confirms Breach of Test Lab Platform by World Leaks Extortion Group Posted: 2025-07-21. Weak Password Allowed Hackers to Sink a 158-Year-Old Company Posted: 2025-07-21. UK Backing Down on Apple Encryption Backdoor after Pressure from US Posted: 2025-07-21. Microsoft Patches ToolShell Zero-Days Exploited to Hack SharePoint Servers Posted: 2025-07-21. New CrushFTP Critical Vulnerability Exploited in the Wild Posted: 2025-07-21. Marketing, Law Firms Say Data Breaches Impact over 200,000 People Posted: 2025-07-21. Surveillance Firm Bypasses SS7 Protections to Retrieve User Location Posted: 2025-07-21. Four New Android Spyware Samples Linked to Iran's Intel Agency Posted: 2025-07-21. About |. Terms |. Copyright |. Privacy |. BlueSky |. X |. Mastodon © 2024 - 2025. All Rights Reserved. Packet Storm Security, LLC |. Hosting provided by:. RokaSecurity</str></doc>
</result>
</response>
