VMware v1.0.1 local root exploit. Tested on Redhat 5.2 and Slackware 3.6.
4279e1d7f7970f9144228a7785457dd44a0425aaae3385a41041a119328a851d
Jidentd 1.0 IDENT server remote exploit. Tested under Slackware 3.6 and 4.0, Debian 2.1, Redhat 4.1, 5.0, 5.1 and 5.2.
9bb5daf2edcaff51a09bef34d3664fe3ceeb2793878de4d7c1634fcf15c2396a
NetBSD Security Advisory 2000-007 - If /dev/urandom is not present and functioning correctly, des_init_random_number_generator seeds the random number generator with constant data, causing the generation of keys which are easy to determine. The following programs which are included in the NetBSD distribution are impacted by this bug: telnet, telnetd, kadmin, kdb_edit, kdb_init, kerberos, and ksrvutil.
e1d055b2555d5fce58da4d1716b13072674fd2c5d66c268d460de2e000491fb8
Red Hat Security Advisory RHSA-2000:037-01 - Kernel 2.2.16 fixes a security hole that could affect any setuid program on the system.
6d11d4be2d606059cea64b44dbdf5edbbc269572cf0d37e7135d80c6ace7d37f
Debian Security Advisory - The version of wu-ftpd distributed in Debian GNU/Linux 2.1 is vulnerable to a remote root compromise. The default configuration in all current Debian packages prevents the currently available exploits in the case of anonymous access, although local users can still compromise the server.
ec7aaf2af99bc801996e49b6d0a1f43661d7e9b8bb2a301838af526c9b343382
Red Hat Security Advisory RHSA-2000:038-01 - Remote vulnerabilities exist with all Zope-2.0 releases. One of the base classes in the DocumentTemplate package could allow the contents of DTMLDocuments or DTMLMethods to be changed remotely or through DTML code without forcing proper user authorization.
895b9df321181a48619206fa37b860cac8f1999174eb76f92a0943ef66c5103f
Patch for wu-ftpd 2.6.0 to protect against the recent remote exploits. This was put together by MIT Information Systems as a stopgap until the wu-ftpd developers come up with an official fix.
a84057119accc24e45fd62bf82d749599c2a358dc5572038a8ef720ee3ca1f58
Wu-Ftpd 2.6.0 remote root exploit. Account is not required, anonymous access is enough. Tested against Redhat 6.2, Suse 6.3 and 6.4, FreeBSD 3.4-STABLE, FreeBSD 3.4-RELEASE, and FreeBSD 4.0-RELEASE. Slightly broken to prevent kids usage.
dbfc37071494eec603b6a8d65a08f55496b09fa218a4e46efacbd9e961e775fd