wpquiz versions 2.60b8 and below have some administrative scripts unprotected and accessible by the world on a default install. Due to this, anyone can easily obtain administrative rights.
7a9f10b22bb93616256191e25fe31336d16398fb756dbe729b5c205f298708bc
Microsoft Windows XP Task Scheduler (.job) universal exploit with portbind and connectback shellcode. Tested against Internet Explorer 6.0 (SP1), Explorer, and Windows XP SP0, SP1.
c0ad2fbcb9aafe3a76b903dc7caa191f29e0d66022d31612c07ee0125af77dc4
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below. Tested under Slackware 9.1.
d82a19e5f51a9ba4c8460f5ece32002038c8d46ebcf499d30b11e369b76326c7
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below.
b3f0b66d1a60d4c9240101ef4ba5d43d95ea2a43380950cc08bf1b9ed846a35c
Previously unreleased exploit that makes use of an old flaw in Dropbear SSH versions 0.34 and below. Binds a shell to port 10275.
578dedc5eba81eca36044639f74218f0dbfd39f1325f3e8749e2c189dce1ae54