PowerZip version 7.21 (Build 4010) stack buffer overflow exploit.
2280b720ac74d90006a42889287873c09ccf3ece7d8d88cd2cb364096704f894
H264WebCam version 3.7 local boundary condition exploit.
33b66c7a966611e9b1b10a2d961477c7c936621e3de22087d0397fd01b9a4e95
Corel VideoStudio Pro X3 local boundary condition exploit.
a806d0400246a52ff0f41d1f57a9aae04b89c33b74473d588ec0499c7c2eb251
WebsiteBaker version 2.8.1 suffers from a cross site request forgery vulnerability.
59d689d83565d8699a13922e5705bd8960fdd8caf29937ba18f079343afc3bd9
The PHP-Nuke print module version 6.0 suffers from a remote SQL injection vulnerability.
0748bd173eadfbab4325f9dcf0eeb7ea91afa9f7ed5603563655358e07e4b8d5
Snowcade version 3 suffers from a remote SQL injection vulnerability.
420ca28ab07c93802b577c8d14611376e85bcf46121709fcc5210c266caa1aef
Winamp 5.572 local buffer overflow EIP and SEH DEP bypass exploit.
fb782d54f780e79c14f53a9397d02e994ff5fa0e7fa8279c9d55629976d69269
HP Security Bulletin - Potential security vulnerabilities have been identified with HP-UX running Apache with PHP. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) gain unauthorized access, and perform cross site scripting (XSS).
c1954c41fb731ee70c50740ef529fcd3936287138bfd2ad9872394c9aa5a8553
70 bytes small disable ASLR security Linux / x86 shellcode.
e73667fa779abc7d845fc6fa3ae4fb49787260154518630cc9d3b1f10d2e1d46
Live CMS suffers from a remote SQL injection vulnerability.
f515afafa64c88ba4b13a81954c2360bd24cea7a48f6517f6a5dd389d672d12d
131 bytes small portbinding 31337 polymorphic Linux / x86 shellcode.
fde8ce1206d01b8ff154c62f329f422631b9c8b377cf7a8ac4230070ae2c69b7
35 bytes small sys_kill(-1,9) Linux / x86 polymorphic shellcode.
5d761a338083c322e54378a446f0addf77e8d1cbbdaed082e1a508368bf008a1
63 bytes small setuid(0) and chmod ("/etc/passwd", 0777) and exit(0) Linux / x86-64 shellcode.
3e41f28b1e74da9daeecb4f8307a8229d304b655f08b9f818258fbfc0b593249
125 bytes small portbinding polymorphic Linux / x86 shellcode.
394cef946cfcaed0ebd881aae89cbefe829496bfb1c78a1da37de2b4ac83b17f
32 bytes small exit() polymorphic Linux / x86 shellcode.
4ae94aaf8e76e2546e6954ea3f99eea6b65587ddc569f2db56ed587eb2c48e90
85 bytes small ssh root@localhost polymorphic Linux / x86 shellcode.
ea41232a950641aadda7b0d06535d7d7fa19158bdd8412c04e0df4dfdabaaa90
Batch Audio Converter Lite Edition versions 1.0.0.0 and below stack buffer overflow exploit.
55f9de422b17a2e4ab8c50f079c1e3564b943b40addd11d3087fc08d2de92e3d
74 bytes small cdrom ejection Linux / x86 polymorphic shellcode.
90bf33e2adfe21ee76e9f4a4e5ad54c2bd24e10fdf2fe331956e1624660d490d
Whitepaper called BOT Networks. Written in Turkish.
807efb1af814e727692c909146dbbb5700d2c1308ac38acdc8cbfbb422ca3cdb
Devshell is a CGI backdoor kit.
e699799c202eec8044569a1867fb88d39c859b87c9907c500f63a15c122997a3
IPv6 Hacking - IPv6 enumeration tool. Supports host enumeration, TCP port scanning, and find AAAA IPv6 host record.
babbfce2ca0a7c77ef1a1ff338b745d7f23442aaeba6097deebbd34f69e4d102
Secunia Security Advisory - Fedora has issued an update for python. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
b4a39ffd86d1d16160e60f49c35730757db689d73fb8411c83b545a07758bfca
Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to cause a DoS.
61d98fb31734e1b04fd4f646573ac2213e3a0347dc7961b0c47d1c1643daaa03
Secunia Security Advisory - Some vulnerabilities have been reported in Python, which can be exploited by malicious people to cause a DoS (Denial of Service).
efa74b539bb5c2d8b750bd7da9eba1cd6afed4a660c0ac2d83c6ffe0dfe4c538
Secunia Security Advisory - Red Hat has issued an update for sudo. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.
1939d2937c7b954635b665ad3154d854ad3d008e5c056f509bd5288f7d8019eb