IBM DB2 local root from bin exploit that makes use of the fact that /usr/IBMdb2/V7.1/lib is left world writable after a default installation.
af0f255f31a50691e25984454e0d874e5554b1017742155e36928b25e81ea632
realpath(3) lukemftpd remote exploit for FreeBSD 4.8 that makes use of the off-by-one error.
97c90d5b2ccc417562521347fcbe9c9fa3363dd44b3ea5d475b6f7b255d0c086
Local root exploit for slocate on Linux-Sparc.
4120fc3b286e38064f2f473b07a64a039c06d26733b33dc3ed74f8aa307fa14c
Remote denial of service exploit for the Cisco CSS 11000 Series.
c5ef0113e39d3c73ba4df7113af56372b1444b5439d9cdf3ae4f662aee1524da
Remote denial of service exploit that makes use of the Postfix vulnerability discussed here.
54fd82b0d9859aa96b40ddaf97c6305be1201cdb2e93594702a51808237266a1
MyServer 0.4.1 is vulnerable to a denial of service when a GET request with 20 forward slashes gets sent to the server.
ca1b79e5b025115c5ec9cb904c864f70dc107b1f2555787902900093a7b61b14
Cpanel + Openwebmail local root exploit in perl which affects Cpanel 5 and below. Attempts to copy a suid root zsh into /tmp by exploiting /usr/local/cpanel/base/openwebmail/oom.
b8529d38cfef755d74cff0d812d2ae5a837fb4a77d433c676607eab5980c5ef1
BisonFTP v4.r2 remote denial of service exploit in perl. Tested against Windows 98.
97d8de62192a0625ac18734043ac9b63b6773448e623ae0e3bef47baf8a7cf53
Astaro Linux Firewall Bounce scan. Attempts to grab a banner from a given ip and port.
3ad8ddcd786f787e0b62854cfaf72adbcea82f6d1d34e227d193c2eeb8a5a731
Absolute Telnet v2.00 buffer overflow exploit in perl. Creates a fake server for the client to connect to, and sends an overflow string once it connects. Tested against Windows XP, based on an advisory by kain@ircop.dk.
af8d5ae98253a8deeb5f462c4c4313d439dc7c3a4d6ee776926612f86b27c414
Pc-cillin pop3trap.exe buffer overflow exploit in perl. Return address is off a little making it a denial of service exploit, but could be tweaked to execute shellcode that downloads a trojan.
8243cebd28bc9dc9a0fc4bca0bc3789808f36fb517a6a3f0b81c499438776f38
Trendmacro is a ISVW V3.6 proxy bouncer and banner grabber in perl. Grabs HTTP banners through a proxy.
aa43f1de04c24c95ac7e59e14e9bbd991950c0f67e3e3b38d7e84adb93926934
Apache 1.3.xx / Tomcat server with mod_jk remote denial of service exploit which uses chunked encoding requests, as described in Qualys Security Advisory QSA-2002-12-04.
26c922cb94695de52658f3b16ebbeebff4426b27d96a6b5ee0ee308e4f190146
Oracle9iAS Web Cache Denial of Service exploit in perl, as described in Atstake advisory a102802-1.
b04f91f65d13ef5a37fc7fa56dcbc09b494c14e7d26b988206b52a9aaff32e39