Remote exploit for Monit 4.1 that uses connect back shellcode. This exploit makes use of a buffer overrun when an overly long username is passed to the server.
9115921f367182e04c2a327689c0ea998acdbb7ffeb7313c0e4390f4bba7e4da
PaX with CONFIG_PAX_RANDMMAP for Linux 2.6 denial of service proof of concept exploit the send the kernel into an infinite loop. Originally discovered by ChrisR.
95b5b952163bbf90669cc041e19deedc691a3f09107b15798b7600eab1fcfb12