Cfingerd v1.4.3 and below local root buffer overflow exploit in perl. Exploits <a href="http://www.securityfocus.com/archive/1/192844"this</a> vulnerability.
7b79ae13d85cacf1b8ce314ae39684e5ad6ef29d9488a23ca3c28dde72ba702f
Hylafax (/usr/libexec/fax/hfaxd) format string local root exploit. Tested on hylafax-4.0pl2-2.
27326b522b9dab8a30cd201131238bab6559ce649d75129f48fd4a1556aa0ffe
Remote buffer overflow exploit for CrazyWWWBoard which executes arbitrary code with the privileges of the webserver. Tested against CrazyWWWBoard2000p4 for RedHat 6.0 and CrazyWWWBoard2000LEp5 for RedHat 6.1. This is NOT that same overflow as discovered by Jin Ho You, 01.30.2001.
19688fd775a7f4f0a92299bf49551ce8414d7d354001d363cad28d1e972b9062
Remote buffer overflow exploit for ASPSeek by SWSoft. Tested against Aspseek v1.0.3 running on Red Hat 6.2.
40271d0a0a1c672f23d3696e35a8917d11de100ed2ed1f211f17056c48582a15
Seyon v2.1rev4b local exploit - Requires a valid display variable.
05f961ae5eea578579a5554674f759ec21d2787c231c85db34475e46faa747ec
Jazip v0.32-2 local root exploit - Takes advantage of a buffer overflow in the Xforms library.
0bb3081442c2c8049ba97fcecf4791726f57f01f26e8e42e9099a1a2abaf460a
IIS Unicode remote exploit - Executes commands remotely on IIS 4.0 on NT and IIS 5.0 on Windows NT and 2000.
fbc3b2aa102785a4757f4a193d95da46e9bee307e89c92a60281da7338e006dd
Poll It v2.0 CGI exploit which binds a shell to tcp port 60179.
ac9a11e96cfadd025d991a68aab80ce6e5c6b256ab9c91bac1ebb6ed4483fa53
Mailing List & News Version 1.7 remote exploit - takes advantage of insecure mail handling to spawn a shell on tcp port 60179.
3a148d33c2f43170a5459c274e9265844c395aa32ff20393b2138faa0365ddd6
Listmail v112 remote exploit which spawns a shell on tcp port 60179. Takes advantage of an insecure open call.
a2ac27c937b546ef9d313562c45140abe85c463a173244433131cd8154e5689a
FormNow CGI script v1.0 remote exploit - Takes advantage of an insecure sendmail call to bind a shell to tcp port 60179.
42bf2ffcf31c7fb94d3cd685478259c9560724e80bf63d3d45532dea4c785e1e
Auction Weaver 1.02 Lite remote proof of concept exploit. Spawns an xterm by exploiting an insecure open() call.
05490e9058e27b2b15a85eb91906bf90777cd620da83832f56681fe3570761b8
Form Mail v1.0 (form.cgi) remote exploit - spawns an xterm from the victim computer.
0a106d313f4d701240d2c353c6d13d94bd56cd95675b225e91644c39bf674c86
Click Responder v1.02 remote exploit - spawns an xterm from the victim computer.
641649b9d5e09cdbd6153ff158fd12a709fc05ea1502c9ebc1c2a9a2d2e706b7
bulk.cgi is a Bulk Mailer CGI which has remote vulernabilities which allow an attacker to spawn an xterm.
8bef063aa4f8a6099294506a682482551cb6e76ed05df104f7d8cd504ab6d562
AlienForm2 remote cgi exploit - Spawns an xterm from target machine.
0f1c6a0e6f0f4c3ce24670e4260bc91a1fbb65613853982bf45a8ba4a3f01572
bnbform.cgi v4.0 and below remote exploit - reads any file on the system.
f8545048ece8ca8481bfdc18a36d3918bf84ddc084afd0240f23a03690f02408