This is a port of noir's dtspcd exploit. This Metasploit module should work against any vulnerable version of Solaris 8 (sparc). The original exploit code was published in the book Shellcoder's Handbook.
19e9ec7b08522229c2b19b1bd544a7ff36ddfd0fd2e0f93cbccac310943ae853
Solaris 8 libsldap local root exploit. Tested on an Ultra10 and an Enterprise 3500 with success.
703e2effcab17ca46f0f0820fae8e927c45ac8cfb996d67be8fc666421a7a8f2
OpenBSD 2.6 and 2.7 xlock local root format string exploit.
d9c51047e5c8a7f38729c09e87bad09d9750d4d980cea6a7b2e76cf318636dba
/usr/bin/cdrecord local exploit for x86 linux - gives gid=80 shell. Tested on Mandrake 7.0.
8c45b8eeaaa72e51223e3ac9a61b3c58d5f14a3ff1e33a32566ccd253e0be59d
/usr/bin/kdesud has DISPLAY enviroment variable overflow - exploit gives gid=0, tested on Mandrake 7.02.
8b85d8dcf4d727c24bbbc0ac3bf68dc420f4d2860eb3301427c685428fe26a91
Sniffit 0.3.7Beta Remote Exploit - sniffit has to be running (-L mail) flag set for this to work. Tested on RedHat 6.0.
b573a5413280903555b0ee0798458bf852149647ac3a38ccab820bebcba4ba44
/usr/bin/lpset vulnerability in Solaris/SPARC 2.7.
738aaad04aff586acc9e1ba9f31af8433e25ab9c588436f502730bdb49b2452a