Belkin G Wireless Router remote code execution proof of concept exploit.
43beacbd1d2f3672fb7be34a7a3f2b6f9fabf3623fbe5cb404ae146733cc6365
Whitepaper called Creating Your Own Abstract Processor. The author discusses creating a theoretical processor architecture that one can develop at the software level.
3377a9e7607686a8415eb224532b12bc436eda19656f6192d4f244d9c631a003
Banana Dance CMS and Wiki suffers from a remote SQL injection vulnerability.
721c9726b4ee05fc640d8842044c0ae02a135b4cde547fc6771d89654c9499d1
Belkin G Wireless Router with firmware version 5.00.12 suffers from a password hash disclosure vulnerability.
1ff16d35f0826f93976163d23810916b6c842c832770207c9409be7c72c79f0d
Tugux CMS version 1.0 Final suffers from remote SQL injection and authentication bypass vulnerabilities.
6f5c40309774516566a5a58515fb3d891b6ed7cdc27767b64d982d08ad2269d8
Log1 CMS suffers multiple security vulnerabilities including direct access to the AjaxFileManager without a session, arbitrary file renaming via ajax_save_name.php, and arbitrary file downloads.
b0d51c9c10fffb857bb52facced82186cfbf945fad03e9916fd1a71c784067a6
TinyBB version 1.2 suffers from a remote SQL injection vulnerability.
aa85d54d4da2d839bb4dda3b4254d56bde4d91ec1a16428915ca6f3c1ee46b39
46 bytes small /bin/sh null-free polymorphic shellcode for Linux/x86.
9b6de913603c8728764097051009ca4e7a4426ca346cfd3b62c59c109147d25f
FCKEditor version 2.0 RC3 suffers from a shell upload vulnerability.
0f67b325a6baa3b5929976a83d14a7b16e3645f4feab2aaaa8e8ba925828c49a
Snif (Simple And Nice Index File) version 1.5.2 suffers from an arbitrary file download vulnerability.
8d49044a22bb6ef51032fbf025432f7ed888926d599eceff9c9eaf303f52a675
Proof of concept denial of service exploit for the total multimedia features in Sony Ericsson phones.
d191de33a2987eccad1849b11681e933d324f04be683549de321882073bfec5a
16 bytes small Message-Box shellcode for Windows XP Pro SP2 English.
f046a00167a3d5df6fafed0240e15d80066760352ef619dfb8420328a41f0d07
12 bytes small Windows XP Pro SP2 English Wordpad shellcode.
c6adf5d5f8b9ce048d4fe598acb2ae75a7fb1112ed7f3ed07c144830f22a5fa7
Zubrag Smart File Download version 1.3 suffers from an arbitrary file download vulnerability.
b4a68a7314a4a13323531468521e1d34fec1a11eaf11048054749b0f3fc75604
Home Web Server versions r1.7.1 and below GUI thread memory corruption exploit.
04325da9d931a22cb87128679ac7cfa9a7eaa5b39a5af0eeec4211e764ea49f8
Whitepaper discussing Mem-Jacking, or modifying the memory of an application.
8ea360fe544a5d1b8495473b654e72610edc784f1ddb16944c3c65d10928b54f
Whitepaper entitled Reverse Engineering Microsoft F#.
4edaef63057c44d9b10082e158d32fd91f25f4a3c1b2b8aa6710a53a6e1909a0
Whitepaper entitled Java 2 Micro Edition (J2ME or Java ME) Based Computer Malware Propagation Technique.
33dd9cf75d17e73d0b9c873025e3dd464002ef35b74dc38578987a00ee29000d
K-Lite Mega CODEC Pack version 3.5.7.0 suffers from a local windows explorer denial of service. Proof of concept .FLV file included.
f185c34337ffb75ba702c410a081508460fd893ed7b670da58994fb7466fcd73