Atari800 Atari Emulator v1.3.0-2 local root exploit in perl which exploits the -config argument of atari800.svgalib. Tested against Debian 3.0. Exploits CVE-2003-0630. Advisory available here.
95b3400dc52a644486fbaa1214978f46ceda013db0eec9a0acd387ea91b29b11
wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.
76fa131537012b1004aff58978340769dc77495dcc3679e28c335c7909cd545f
Local root exploit for kon version 0.3.9b-16 that makes use of a buffer overflow discovered in the -Coding switch.
1586b70f358e651d05f55592aa0f4e846738771a8dd29314ac025f542afa01e6
Denial of service exploit for the Pi3 web server version 2.0.2 that makes use of a malformed GET request.
a8f85d35b6797d09c4202c3b2fb8795e1815a65b2aacffdf8e99139fd252c0cd
firedoor forwards any TCP connection behind a firewall using techniques similar to reverse telneting. Written in Java 1.4, so it is very small and can run on both Linux and Win32 without modifications. Source file included.
0e1ab0a961683d87dd2a4dab9f692fd310b4aaf55c7537816f69d508ead51b21
FreeBSD Security Advisory FreeBSD-SA-03:10.ibcs2 - The iBCS2 system call translator for statfs(2) erroneously used the user-supplied length parameter when copying a kernel data structure into userland. If the length parameter were larger than required, then instead of copying only the statfs-related data structure, additional kernel memory would also be made available to the user. If iBCS2 support were enabled, a malicious user could call the iBCS2 version of statfs(2) with an arbitrarily large length parameter, causing the kernel to return a large portion of kernel memory.
2c9b5bbe17a8ffdc72ab9be9c1de622434f5b2edb34fe8252dc32db8f6d8db6d
A high performance C++ class that is useful for getting around firewalls and redirecting TCP traffic.
9905ad8673701946518e32705fb73f51638d79e4fae7d764c5f875eaf260f415