Lua version 5.3.5 suffers from a use-after-free vulnerability.
e4fa1f2a58aeecca822a55e272763709ae37bde58311cf5071a4a4b56331b1ad
Microsoft power point allows users to insert objects of arbitrary file types. At presentation time these objects can be activated by mouse movement or clicking.
2d838b7169aaadc022b8b58be4e89a994a898f95dd32856f8fa4e1c3b5cff755
Check Box 2016 Q2 Survey suffers from insecure direct object reference, open redirection, and directory traversal vulnerabilities.
9b4750f5dcfb38041c933481c1c73bcee5f56bc5a8dcd1690f3f211a04f0f949
Internet Download Accelerator version 6.10.1.1527 SEH FTP buffer overflow exploit.
7874cb1d2810b2da3d57766262574c5caf3e798d8c840e2c0f7736799222c852
Two exploits for Huawei Home Gateway versions HG530 and HG520b that allow for password disclosure and password change.
34153720563cde72b885eab1bf23d3c0496dfd344433d5815451d5624f2154ec
Bsplayer version 2.68 suffers from a buffer overflow vulnerability.
1883a3de8c35bc6eb6111a926d89440ee4486787c324e059331f50b429893dc2
SQL Buddy version 1.3.3 suffers from a code execution vulnerability.
a7040fa9a7bbf05e878f4e287a5244f16ee0664c859fff5c38264b6a7d7d9f50
This Metasploit module exploits the shellshock vulnerability in apache cgi. It allows you to execute any metasploit payload you want.
a864c843ce6ef903a561a68316c0959dd2b138cad93a26d0f8f6d85e6d98db5d
Chrome EXIF Viewer plugin version 2.4.2 suffers from a cross site scripting vulnerability.
c644383ea97849908e0131845cba66ddbf35234494ffc174a6062b9d9ba9160a
This Metasploit module exploits a file upload vulnerability found in PolarPear CMS. By abusing the upload.php file, a malicious user can upload a file to a temp directory without authentication, which results in arbitrary code execution.
d370b8ce0ea599ae7baa968d4166c255fd933b5c56eb77c490c0d1b8f597ef28
This is a whitepaper called Bypassing Spam Filter Using Homographs. Some generation code is also included.
53ce87d77ad354d381340e51d46995bbf63257ebb4dd4ce48fd728ce00168df1
This Metasploit module exploits Stream Down version 6.8.0 using a SEH based buffer overflow that is triggered when processing the server response packet. During the overflow a structured exception handler is overwritten.
6bbe536d2eec48c278183c8a6d5335f1b5a29fdc9af13d4570983598df20d9f2
Winzip suffers from a WZFLDVW.OCX IconIndex property access violation vulnerability.
ff728bf1648fc8e530934b75863f3a02606fdc25fcea88093cd5baeb13457649
Winzip suffers from a WZFLDVW.OCX text property access violation vulnerability.
ff2c2610a0496310cfbe5babcef3742c35a23898cd9fed8f5de593fc4ce9da78
Gom Player version 2.1.27.50.31 suffers from a denial of service vulnerability.
b33b3d3363311d7c82030203abf0615f58600e1c14a1e0fdfa4cdf176bb2dfbb
Whitepaper called Hiding Data Inside the Padding Area in Files and Packets.
819645d52b63d793d6d0509595914620f52291f7cfda89efb56aad13d26ca5a0
Saurus CMS version 4.7.0 suffers from a cross site request forgery vulnerability.
e4af35f4c68ddd89b1127018fc1dda5abf41a31f111572dd07794d3359fb0d01