Robotex Viking Server 1.0.6 Build 355 and prior for Windows 95 and NT remote buffer overflow exploit. Binds a shell to a port.
e22c42e753f4fa08366620f23765653b64d03ab67ef2ecf8a07e490cb488a968
Mobius DocumentDirect for the Internet 1.2 remote exploit. Binds a shell to a port.
ce3a7e218bb9fb62db69535c606419166b381ba3fb2b77281d56bfcfa40b2ec3
Windows 2000 telnet server denial of service exploit.
4b4ac82588b827afa52230a5621bf5b7eff2d4b62e97dd799a095d1aa6e8cf1f
awcrash.c exploits a buffer overflow vulnerability in Windows 95 and 98 which will result in a crash if a filename with an extension longer that 232 characters is accessed. Although arbitrary code could be executed via this manner, it would have to be composed of valid filename character values only.
7ad7a060484ff8053e615253a0723a73a32a083f94fe5194af600dcb8126a5e4
Gopher+ v2.3.1p0 remote exploit - Spawns a remote shell on tcp port 36864 under the UID that the gopher+ daemon runs as. Tested against Linux Slackware 3.6 / 7.0.
71aa58978ab9c730cefaa09803a9c98febeb91b69d9d601ac9a232b790ac1e41
Wu-Ftpd 2.4.2, 2.5, and 2.6 are commonly misconfigured on linux to allow users which only have a valid FTP account to execute code. This code takes advantage of this configuration, mentioned in SUID Advisory #1 to execute a backdoor on the remote host.
9219f3dc8c4357646bf46266ad5c55bda0e603191ef80f27186b4ccf5fb83945
SuSe 6.1 through 6.4 local exploit - when root switches users, /tmp/ will be the $HOME. This exploit will create a suid (user) shell when root su's to a user account.
0c640e5bd6cad6ab1a9f902ec11367abac1597d2768eedf475e4293e23c3c435
Gnapster 1.3.8 and Knapster 0.9 remote view file exploit.
53c82a8e2d27ddb652a607c8842ffdc06767db6dc99711ae7c83b0e6575c08d9
ProFTPD 1.2pre4 remote buffer overflow exploit. Requires a writable directory.
ddaa523bce8660f1ea7139487103115776722b6432a3e876c8f85d29b5c96cc5
JRun 2.3 remote buffer overflow exploit. Runs a shell on the port where the JRun webserver daemon is running.
0009f8a8198fbfbcd6431fe2f632926a00f52ef872ba53530e82d7fec95be05d
iisdos.c is a dos attack against Microsoft Windows 2000.0 running IIS.
3a5391689ea601a5d266aaa724384ad438a4b0e2bd5af92c61ad494be825bb70
Debian 2.1 local root exploit - A vulnerability exists in the apcd package shipped with Debian 2.1.
f7ca16d4ea9299fd7aef4c4a72b95848377702b1feeccf9d2d657e4193b25dbe
The WC Remote Administration Tool (v1.2b) is a Windows remote control trojan coded in Delphi. The client is in C and runs on unix. Includes a tool (LookItUp.c) to test a host for infection. Archive password is set to p4ssw0rd. Use at your own risk.
ec93afe0a1310cc59aa7b6f86bf45f137b1188460ae088fc8eb3f751e59a4264
HTTP-XpsScanner scans a remote webserver for 77 vulnerable cgi scripts.
9f64d018277b2464ac86046ec1d3fc1aae140c378368b93e82d9c71a193f3bec