Linux x86 shellcode which does a chmod("//bin/sh" ,04775); set sh +s.
73a8c94b4834ab4ee35bd22fb4b7e554437291febd01c57f6bcc0097963686f5
Linux x86 shellcode which does a write(stdout,"bob from DSR", 15); exit;.
04c216d2661400f510d03ed170a51474fea2bbbd044a369889d0cc9dbb7ae928
Linux x86 shellcode which does a setuid(); execve(); exit();.
fcc33d1d4463f6e6216c770d49c99329c3d91bd9514881a689a27f43b566c7b2
Linux x86 shellcode, to open() write() close() and exit(), adds a root user no-passwd to /etc/passwd.
ecb8d8439ae492600571dd2b132d0cd576f63a9529137b7ed872348f993c984e
Linux x86 shellcode which does execve()/bin/ash; exit; in 34 bytes.
1c5867190284199a34f431a90516c4ad9cc0b7800020a274f5ca0999fa97fafe
Linux x86 29 byte shellcode.
48560a596340c96401aef340150dccc2653630871f8e1d9de9742ee45cb25fac
This Proof of Concept exploit for the current directory traversal design flaw in apache 2.0.x - 2.0.39 allows any attacker to view any file on the target machine. Original vulnerability found by Luigi Auriemma. Affected Systems: Windows [win32], Netware, OS2, Cygwin.
6aceadaa5b57140304df3527499731b71b0374b1690f5244471132425d9e168d
PHP v4.2.0 and 4.2.1 with Apache 1.3.26 POST bug proof of concept exploit for x86. Produces a segmentation violation (signal 11).
e1e66701c77072a167c7aa5778b3d30cc69da1019bee73ce24e76872d8212be9
Backdoors Bash-2.05 for local root.
a091c406eec0646458840e3613e28a2adfa1c29709189adf1882c67b9ae23876
Apache remote DoS (1.3.x/2.0.x branches) based on the recent flaw met in chunked encoding.
cec28b70971878ff54768796e2494d2f8f48cedd275ac84b1261c0bfa5ecdbd3