32 byte execve() shellcode with 'fuck up disasm' ability.
ad2250ea9791a84a522c61851997606eabe8ac44ff645a9b816167d06cf67db5
23 byte linux/x86 /bin/sh sysenter opcode array payload.
c6fcfb33ec9f6fc7239338c5b769cff2c18bd07163945629fb794f7efd19c361
YaBB SE versions 1.5.4 to 1.5.5b are all susceptible to various remote SQL injection attacks.
d37c5048d51d248294618dab5c91a0b3df20b1030af3cf3694cce090223ea121
YaBB SE versions 1.54 and 1.55 are susceptible to a SQL injection vulnerability that allows a remote attacker to execute malicious SQL statements on the database remotely.
0cb034ef99caa617751564217c86b7aa293f12c1a2e323fbaed9a9eb14a1dc80
YaBB SE versions 1.54 and 1.53 have the functions welcome and recentTopics which are vulnerable to SQL injection because the parameter ID_MEMBER is not checked against malicious input.
95e89384d3a5e60f55043d680923bf50f3a2d727d428ca8993e211fcbfc77dda