Acronis TrueImage versions 2019 update 1 through 2021 update 1 are vulnerable to privilege escalation. The com.acronis.trueimagehelper helper tool does not perform any validation on connecting clients, which gives arbitrary clients the ability to execute functions provided by the helper tool with root privileges.
64e516f7e243343a09b0c147d3a167346d6cd74cc8c16dba1cb067a60cd06847
macOS 320.whatis Script suffers from a privilege escalation vulnerability.
e578f65b68fcf2548e910793e37c196e060d6250ff94cec53221209d10a3ca20
Easy RM to MP3 Converter version 2.7.3.700 .m3u exploit with universal DEP + ASLR bypass.
c1b6ff1ccc271bc2947e2458d9021c1994270c51f8e9a947e5c1a3834bd58107
34 bytes small NULL byte free OS X x64 /bin/sh shellcode.
62604cfda35d5ea48e784d6b5bfb83d4ce2aa61f09505d7ee7a39833737dc0ef
OpenSSL TLS Heartbeat extension memory disclosure proof of concept. Expansion of the original exploit from Jared Stafford - this one supports multiple SSL/TLS versions.
eacf96cd5f65b639ffd1574293f581a43f690b7ab4f4237f23f7ea69179e7347