Local root exploit for the x86_64 Linux kernel ia32syscall emulation vulnerability. This is a variant of a vulnerability found back in 2007.
a975a5a7e9e7bdcda51544b9df0e5c25b8e47ff9127f4b0b85f74f3553538ba9
Local root exploit for the x86_64 Linux kernel ia32syscall emulation bug.
8d91a3219d851d8406ae0d6bc5f4d6d08474c37d42d187149534fafa463a0295
ld.so from Solaris 9 and 10 does not check the LD_AUDIT environment variable when running setuid and setgid binaries, allowing a malicious party to run arbitrary code with elevated privileges.
99095146827726d63bfcc4635cf1196f0a332c6fd871b51f211d97645f2ae3c8
traceroute under Solaris 10 is susceptible to a buffer overflow in the handling of the -g argument. Sample exploitation included.
cb0c0dbe8ee0f3edaaa0aa00d00ef0112897f0cc43532ced7b96994aa211b0bb
Amusing tidbit showing Google segfaulting.
baad030777afff8736e17d8fe3f4fad86e49921d89f905960698e6c1306edf62
mtr is susceptible to raw socket hijacking, allowing for the spoofing of ICMP packets.
b3f8a5bc5b692a1d3e9aa51ea3ec27dc33da5b639807dd50e72b0fcff611b97f
Zyxel P681 SDSL routers disclose random portions of memory in ARP requests.
a8bca94387e9cd38728d7e3e9d38ccd9f127ae129768830595a01aae1c94881f
NetBSD Security Advisory 2004-009 - A set of flaws in the ftpd source code can be used together to achieve root access within an ftp session. With root file manipulation ability, mechanisms to gain a shell are numerous, so this issue should be considered a remote root situation.
19988f37ee9bac237bfdb409657a8f72e0dc9b3791fb9c48b914cfac30ce0bdd
OpenBSD 3.0 cron / mail local root exploit. Creates a suid shell after /etc/daily runs.
a5b14450d1deca2a74846d64060b6c511cf04d505827df0274ff8d1380dc0745
Plogd v2 - syn/udp/icmp packet logger (freebsd version).
6c7d6a373bf27fc4fe88c764bdf5b002ece8a6296bef7632474fc0eaa5c56233
FreeBSD-4.2-Stable ftpd GLOB remote root exploit in perl. This version requires user access and writeable home dir without chroot.
d9d003dd6fbf397662aaadea0cda37b79f4f487bbe81f0f4dca4c6995f5cb632
Bobek.c is a Wu-Ftpd 2.6.0 remote root exploit (updated 05/08/2000). Bug is in the SITE EXEC command, an account is not required as anonymous access is enough. Tested against Redhat 6.2, FreeBSD 3.4-STABLE, and FreeBSD 5.0-CURRENT.
271153fe402f54217a98ff64ba5860d7b6059482b6a0d067654ec98d32bd7b48
FreeBSD 4.X local /usr/bin/systat exploit. Gives a sgid kmem shell by exploiting the .terminfo bug in ncurses.
74912457abcb06d1b3486b0919890ed721d24f2ed15b58307dd60bb46c085361
HPUX's ftpd contains a remotely exploitable format string vulnerability in the PASS command.
deb05390fad773d1f8e594e39f6c365b21288c7dc57008d1e696e4e2da8fcb7c
sms.c is a remote SMS 1.8.2 (mail2sms gateway) long subject line remote buffer overflow exploit. Send the mail generated by this program and a shell will be listening on port 2222. Offsets adjusted for redhat.
5263a1384cd6d126f626841f9e172551ca855196cc1ef2d42713cc721e51647b
syslogd-to-MySQL wrapper v0.1 prebeta. Stores syslog messages in a MySQL database. Written for FreeBSD.
b44da69a92c3350c4053b05fab764bff3d6940f5eb010c5337cd82acb8578da7
Plogd v2 (Revision 1.5) is a syn/udp/icmp packet logger for freebsd.
c8063e2434da5fb556ad35fc5af1b0a42d30521cf23bede1da4f7da952df83df
BufferOverflow Security Advisory #3 - libncurses buffer overflow in NCURSES 1.8.6 on FreeBSD 3.4-STABLE. Setuid programs linked with libncurses can be exploited to obtain root access.
d3900b7fe44530224283ef6bcd98f8704f6c629dab6bcb828e3d5083c81ea48e
FreeBSD mtr-0.41 local root exploit.
8fb8c8be26e6cdcb84cb5bb42887b0e84ec53f58ef96682bfc2e84d893e90fd4
mars_nwe 0.99pl14 root exploit (linux).
1db24f34aca77024b88baaacbf9a1854e0ff4717e6afdfe44e406ecb090e7ea4
Novell NetWare webservers remote denial of service - Tested on Novell NetWare 4.11 with Novell-HTTP-Server/3.1R1, Novell NetWare 4.1 with Novell-HTTP-Server/2.51R1, Novell NetWare ?.? with YAWN/1.05.
82e29ba646ae0fed257d1d55f00ab7948089713cf990959663a0e8bc3f3537f7
FreeBSD 3.3 /sbin/umount exploit.
c72ade93bd2e85828e67454faf5440e0cfe5b1c3a5790d0af0f11707b19a77e9
Your ultimate proftpd pre0-3 exploiting toolkit based on adm-wuftpd by duke and kombajn do czere^vni by Lam3rZ.
1f50aad4915bd7f7f7e2832ddc97f43eb97406729b6e04f901fe4a0ae46c874f
Redhat /usr/bin/man exploit (gid=15 leads to potential root compromise).
d047a4471bf94117e04bb0e27a10406bced47cad8417a1cac07d960a8d4110c5