This paper acts as a guide for penetration testers and security folks who want to use Shodan and helps them to understand how it can be used it for security auditing purposes.
f3055b23c6df1c988329eb2888420e96643f64d3992ac59ee639250d7c272283
User Friendly SVN versions prior to 1.0.7 suffer from a cross site scripting vulnerability.
2563320161d0c04a3683751b1af8691a3a5d0135333e64fcb8888672f2dd61c4
Linux Kernel versions 3.13 and below local privilege escalation proof of concept exploit.
1ac2109c899cc9ed0d918dfef397ba64d9302acb0de0d5206638e54f5510f29f