Mozilla Firefox XSL parsing remote memory corruption proof of concept exploit.
ae3cddca8fd47a0b32d6c9919b88c5560c2c687e0ee839017f5fdf337f24d4b3
Whitepaper called Microsoft Internet Explorer XML Parsing Overflow. Written in Arabic.
d8fdbe86ca28467e6683b7a9b2ed574c876883a027ed410f8e9c6536dd79b0a6
Whitepaper called API Function Parameter Hijacking. Written in Arabic.
0da96fda7be72622e9b1056ae935f9f65b8dae3185e099c44bf505818a928765
111 bytes small win32 telnetbind shellcode. Written for XP SP2 FR.
2e9b2d353a417870ea61f15d06c81e4efd2a3f2ece8a551ed3b68fee7d8fdd4a
Hex Workshop versions 6 and below .hex file local code execution exploit.
3c7173ddd241e394771edeb7a79afaf725f7dfc676e84e70b541e915bbaa6834
Hex Workshop version 6 invalid memory reference crash proof of concept exploit that makes a malicious .cmap file.
212e459b6da6a635f8b5e94175e3a442aa2bd9e90775f4d992e14e9c63dbe9f0
GOM Player version 2.0.12 stack overflow exploit that creates a malicious .ASX file which will spawn calc.exe.
2648e1de1d28a8ed1637ad2f8caa8a5a386c4c2ea4085a2316ea64e39b6184da
Multiple Anti-Virus vendors suffer from a malicious webpage detection bypass vulnerability.
f9dfa7e4d1f5008192bc17bb6b43ec0be0a51b5cc1e9623349686dfec0b9b2c1
RadAsm versions 2.2.1.4 and below WindowCallProcA pointer hijack exploit with calc.exe shellcode.
a078245e4dc9f99ff9085ae22ff8ab3168c8b038fe72eb8aaf159639d03e45e3