ARISg5 version 5.0 suffers from a cross site scripting vulnerability.
c5198d5f0e7e3bc211bc96fbfda873a31bfed02e818bcd04d6b3f10e9eec1edf
DZ Erotik Auktionshaus version 4 suffers from a remote SQL injection vulnerability in news.php.
ffaaf3742b149476a133ccefe78aac690987d49f2701d28be02ea20fc473cf95
Exploit writing tutorial 9 - Introduction to Win32 shellcoding.
3706f35a0ce8ee03fa0b64d0df8875570a1887011f234d325ca5f281b133b56b
Exploit writing tutorial 8 - Win32 Egg Hunting.
cdc785e5c04945be39fd37440864d660ed1b41c96631356fd999a24924338d8d
Ubuntu Security Notice 905-1 - It was discovered that sudo did not properly validate the path for the 'sudoedit' pseudo-command. A local attacker could exploit this to execute arbitrary code as root if sudo was configured to allow the attacker to use sudoedit. The sudoedit pseudo-command is not used in the default installation of Ubuntu. It was discovered that sudo did not reset group permissions when the 'runas_default' configuration option was used. A local attacker could exploit this to escalate group privileges if sudo was configured to allow the attacker to run commands under the runas_default account. The runas_default configuration option is not used in the default installation of Ubuntu. This issue affected Ubuntu 8.04 LTS, 8.10 and 9.04.
6429269d5a7e2fc27d46e77eeca2faf4ade70b577099f07867e05c9aa22b77c1
Orbital Viewer version 1.04 local universal SEH overflow exploit that creates a malicious .orb file. Comes complete with calc.exe, reverse shell, and bind shell execution options.
5994c9312d2de35abf67d5cadda0954e2ebe6cea9934c77c108332ec3128da1f