Safari version 8.0 on OS X 10.10 crash proof of concept exploit.
437eafb52bef71c294744b306d459d357ec21d1f6d232fc3c079998fd5a24784
This Metasploit module exploits a vulnerability found on Firefox 17.0.6, specifically an use after free of a DocumentViewerImpl object, triggered via an specially crafted web page using onreadystatechange events and the window.stop() API, as exploited in the wild on 2013 August to target Tor Browser users.
e39e25d6845ff273ea20decb29f0fdfaca25648ab187f57278e8c2b631ce94c2
Invision Power Board versions 3.3.4 and below unserialize REGEX bypass exploit.
ad210687f42887baff2de52193e65980c72d969f3690120bb695a84ed8356c42
Excel SLYK format parsing buffer overrun proof of concept denial of service exploit.
c515ec3b3b89acbd7783600d443052f2af54c8a1f404a889d035b223d4e2871f
Microsoft Office Excel Axis properties record parsing buffer overflow proof of concept exploit that leverages the issue discussed in MS11-021.
e2b8a20317fcb2c65a108738183b164cb42f48896b69cc8d703724161298a74a
This Metasploit module exploits a directory traversal bug in Adobe ColdFusion. By reading the password.properties a user can login using the encrypted password itself. This should work on version 8 and below.
30d24479f36de7b6cb78e0669b676ca8ad8705ff92ec0b9d808502f823261cc0
Microsoft Windows task scheduler privilege escalation exploit.
bca5b384d4ee263828f222a4b6f60e975a131a639b63689c25912cab251c49d9
Microsoft Excel 0x5D record stack overflow exploit.
663a8f6c7c8c3ffa90aea8fb5d6529116f428e29f3dbb8e5e8939cc3d1fba554
Real Player version 12.0.0.879 0-day exploit for Windows XP.
a9c693f51a571de7cd8bcdc9f7a606bd8e2f9369e1646f386955b0d443cf517d
Microsoft Windows 2003 EOT file BSOD crash exploit.
514c42533cf5970170afb6c5ce199f2f1f171f1e7825a7d778f2d2819af3fc7d
Apple QuickTime CRGN Atom stack overflow exploit that creates a malicious .mov file.
fb8e543a1b14d05da7d1eaf72adb2dc68be619562fc03383b54d35808421f260
Apple QuickTime image description atom sign extension vulnerability proof of concept exploit.
5ad33984128407af0101e9e88f8c89419b476dab4ef79fc88483a2e37a5530da
Microsoft Internet Explorer 7 memory corruption exploit that leverages the vulnerability listed in MS09-002. Written for 2K3 SP2.
ea20d5bbe51604a1a76dd0af9b738fa01461f0c874d138c5bd4b6d80a63953a3
Amaya Web Browser versions 10.0.1 and 10.1-pre5 buffer overflow proof of concept exploit.
cb4e1f5e826cad6a48620c692036cfe39e35ce46593f1dffe98c6adbc4056061
Whitepaper entitled Internet Banking Flaws In India.
5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920
TWiki versions 4.2.2 and below suffer from a remote code execution vulnerability.
a99d6105ce282f0c5ea462dfe5cab8682dcdcb326e1b0bce1acc9cd7836ec976
Technote 7 suffers from a remote file inclusion vulnerability.
689ca3e963f221dc3daa0aeccdbcb970cb07b86a9ea3d539f1369ad3b65be698