Presentation called Further Down the VM Spiral.
c375df19723aa50405c3578260589605b47dac194a812c3bcb3360c7a43ef6bf
Whitepaper called Inside the Malicious World of Blog Comment Spam.
dccb3a2c0c1cdd5b6a2aefb021cd01be7b0b1a7fcca5840483c345b10b991d3b
Presentation called Hacking Malware - Offense is the new Defense.
49a69eea4ecdcbb9fd14a6e4078bbd75a781159d16030e70283919300e0d4dd9
The Indian Institute of Technology in Kharagpur suffers from a remote SQL injection vulnerability.
65ffaa8d6376c8517275ac697f1ece253189ea0d2a840a1566d48af4b78ef51c
Lito Lite CMS blind SQL injection and cross site scripting exploit.
b804b6d14e6821df76e2fa7ed5cf5e6c66c0d81c93562bd41d00a0a0d3bc4946
Destiny Media Player version 1.61 .lst file local buffer overflow proof of concept exploit.
6ac33e42cfc5b787110bb18684048bb75011f6ec4933b4d8da64404116955ec8
Webspell version 4 suffers from a SQL injection vulnerability that allows for authentication bypass.
d44bb51f35980ad029f2b60873d201e0e444b83c0b6bc9623281070c2617f83d
Destiny Media Player version 1.61 .m3u file local stack overflow exploit.
66b4cf962ac53d164935d758bbdc0878ff5c0fada1faf2ee553ad1078a4381b8