Whitepaper called Bypassing Browser Memory Protections.
4bb235b44799001d4a44274262b9d944e99bca3cb5b4c65e5344121784a5e29e
This Metasploit module exploits a heap overflow vulnerability in the KeyFrame method of the direct animation ActiveX control. This is a port of the exploit implemented by Alexander Sotirov.
ee23cf2762a7f51047b8075259d50984edeb1f3ca15637fe82e5757310a61103
MD5 Considered Harmful Today - Creating A Rogue CA Certificate. The authors of this paper have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept they executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows them to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.
7bc4a39c6558907b3bf4b6c5957b648d7c871e27bac56e6bbd00a2afbfd679f2
Determina Security Research has discovered a denial of service vulnerability in the code responsible for parsing iCal email attachments in Microsoft Exchange. This vulnerability can be exploited by a malicious email message and results in a denial of service. The vulnerable code is present in Exchange 2000 and 2003.
ebab06b649822f2a01004927c501873f74ff5954cdb57c27bd9b844708cd3c6a