Gentoo Linux Security Advisory 201903-2 - Input validation errors in Zsh could result in arbitrary code execution. Versions less than 5.6 are affected.
adf5577ef412c7a0bebf5216310516966d1afa39a6944735da8cab7de7d533d9
Linux/x86 polymorphic shellcode for execve(/bin/sh).
9858aa6d8f4d92a761b460a1cec910804adffbe53f7032067351eca04c326c30
UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
1c23438ca8f3f2ec38a7523925939b1b202c86ab5cabc8f1b9c8a9de4add7ea7