CuteNews 1.4.1 Arbitrary file inclusion and remote code execution exploit.
b914cc41173788699408b2682073f31a26b0ddf39c5b0e48e606a6b8ae4d6665
This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.
95e588790aa423059221be1e0e1337e75a7ed8a2cda22435c4fbbb9aac09dc04
Movable Type blogging software stores the admin username and password hash in a cookie, leaving the system vulnerable to XSS.
e717f6c404ec08c8a538f3e595e63353134ba9c9d6f6977e7706f15dd003b701
Writing Stack Based Overflows on Windows - Part II: Windows Assembly for writing Exploits
458ebf2f8f50c0249db41a0f2babf0e9c981f7c972089ff9b19153fd0210a5ff
Writing Stack Based Overflows on Windows - Part I: Basic Concepts
f2eded9aca3088ea4d10a3faf846a8d5c7b7d77f76c4957ad9691750d63e1c75
Sip Send Fun version 0.2 - a tool to exploit the various weakness in VoIP-Phones. Written in php.
4caf3015d8abe09a2efcfb6068961af9f04ed3f7fd73754ebd4bd8ca6b17394a
Mambo versions 4.5.2.3, 4.5.2.2, 4.5.2.1, 4.5.2 suffer from a path disclosure vulnerability via a specially crafted url.
57f70dae3c661dfcc4fda834e1ece2567e5eb94330ef99f18e07214cdb9a1955