This article goes into detail on how to overflow a custom heap in Microsoft Windows 7.
da85d1c71e43d3dd424e4a8554fff860e473083210aa9ad816da6ab171e9b515
This is a brief write up discussing a root cause analysis of why spawning calc.exe triggered a stack overflow.
df816f981278218c855742bbf91b22db7088072ca5aade2974f7d629781ce6e6
OllyDbg / Immunity debugger crash proof of concept denial of service exploit.
675d2824b19af798e908b299af4c63101ca4f8e7734c1c02006fdc9bf019156e
aSc Timetables 2013 suffers from a stack-based buffer overflow vulnerability.
456f8e6a3244e971ad39ce281111d3f8cbb2a46cb66c2ae86b5dc1c3ed95dbb5
In this paper, the author demonstrates how to beat an advanced crackme using an interesting way to calculate the length.
f1f14e176c436b51bba232ca3a853a42254f21cd245f711f08f895f13a1ae639
This is a brief tutorial that demonstrates how to reverse engineer an offline game (3D Pinball).
426f7edb198602eac9058b56437b9eeffe6b5b0b774f60a26ae114893d91c018
Twitter apparently fails to zero out and invalidate cookies upon logout, allowing for replay later.
3d43799d9838174b65bdfa37b2cb2adddb40be1cc7d7947d3253b2eafac66181
Huawei Security Advisory 20120922-01-UTPS - The back-end UTPS software suffers from a buffer overflow vulnerability. The UTPS 1.0 back-end does not fully verify the incoming parameters when copying the character strings during the process of uploading the plug-in configuration files, which leads to the overflow (HWNSIRT-2012-0994). As a result, the script which is specified by some malicious users may be executed to run the application program which is specified by the malicious users.
84b868d6a7c48aeacee07bcc35feff44b4cc4ca28212fcc648aff97251964d61
The Joomla iCagenda component suffers from remote blind SQL injection and path disclosure vulnerabilities.
c186dd88d27cbd897492034bea5e2be409f2d91cd8ee702fa3a083a05391695b
FL Studio 10 Producer Edition SEH based buffer overflow proof of concept exploit.
baccc3c89450e01403323b36347d890a84bd82c9b7faff4e753ea4c496b4259c
Huawei Technologies Internet Mobile unicode SEH-based buffer overflow exploit. Works only on Windows XP SP1.
94121e361b21a76c84d21b0577c7bd10dbd0821cac5bd77f02b44d238e67dc90
73 bytes small Linux/x86 Nmap default router services scan shellcode.
eba44ff0ad200eedf51987bb0b0229abe3206f8011b11dfebdffd9fbc460b183
121 bytes small Linux/x86 man /bin/cat shellcode.
1f23c312df1064018158e04828ddd8afd600f9b3bfa0d16a31f90d173ea332c3
126 bytes small Linux/x86 cp /etc/shadow /tmp && chmod 777 /tmp/shadow shellcode.
3281284185894711f02603966afa216e2b23233c3410d64c430071df5a8869c3
Internet Download Manager SEH based buffer overflow exploit that spawns cmd.exe.
6b1d1f0931da27bc6e7a701bad516d556bcb7d07ac95b7850477f687fe80adc6
Internet Download Manager suffers from a buffer overflow vulnerability.
ac2a7cf7ff7d28aa6957250c17b97b117ba47f182bbbd26140d2b8a239610de7
WordPress Krea3AllMedias third party plugin suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.
82781413cae2166f326ac53a670a474a65d6db5c197757581b095f4f6d13833d
WordPress Tierra Audio third party plugin suffers from full path disclosure and directory listing vulnerabilities. Note that this finding houses site-specific data.
eb8bf13ce083445d9f8934609a93b31fdbda0da617aced0b90568a7a46902d18
This is a whitepaper discussing spam and hackers.
edb8e62f33060078f8b356e775ce645ac9724f3072cc0ffd701749cf81b23d38
The Joomla ICAgenda component suffers from remote blind SQL injection and path disclosure vulnerabilities. Note that this finding houses site-specific data.
f03c312f386b157c2b2f9649b26d2b92df905d59d33fe475f5d68ae0a4722083
The WordPress BBPress third party plugin suffers from path disclosure and remote SQL injection vulnerabilities.
789b82c3f132aaefb4f7c5bbc76519f1c7fd1fe2a7b261ace1fa3c5f84950de6
The WordPress NextGen Cu3er Gallery third party plugin suffers from multiple information disclosure vulnerabilities. Note that this finding houses site-specific data.
abf72377ec975a4d3d5a5185d66bf2176d2e93fb7206744c6730beca8685f837
Internet Download Manager suffers from a denial of service vulnerability.
19dcbb058f55930947113cae0c2f76cc837250746a9ae391532c0501f0db61a7
Divx version 6.8.2 suffers from a denial of service vulnerability.
9e4f3b9ce274360447887becad17d4617d27a3dc9c999659e4bc9cd7e48a92c4
VLC version 2.0.2 suffers form a division by zero vulnerability when parsing .3gp files.
da55a94e432e51e736b1d6f0ce42d24343527d51712743f54b3519ce8df13c19