phpSysInfo version 2.5.1 has a remote flaw that allows for an attacker to verify if a file exists on the underlying system.
87e91a7833ecef51e46f55aa5f510504fbbd816ec1682fdfe7e2a3901d6f3f34
Paper discussing the Stakkato intrusions which ultimately resulted in the theft of IOS source code released by one of the affected sites detailing how they caught stakkato.
f12d9a771f93e172c82d0cf8c134be8d0542594beb3ee7913f2f44001af575f3
GNU PeerCast versions less than or equal to v0.1216 Remote Exploit.
52782b7c57a34d83e13abde55ce91f90e5499e6f8617ad2fe720595a4239b49e
The Linux kernel recently incorporated a protection which randomizes the stack making exploitation of stack based overflows more difficult. This paper presents an attack which works on exploiting static addresses in Linux. You should be familiar with standard stack smashing before attempting this paper.
1b5fae8f77b5a710bc423947e91f436ec3c4ef4738ad4ac0a447048bfd559048