SHOUTcast version 1.9.4 remote exploit. Tested on RedHat 90 and Fedora 1. Has connectback shellcode.
01fb25e458acea0e70572dfa7a4519ff1bba3f7699629b31e3eee8cdd497c6c9
cfengine RSA remote heap overflow exploit.
945ddc6e5642a02edd2bfd2623e328ef3b0dc1e69bd2da81c53810d911c2a07f
SHOUTcast version 1.9.2 remote exploit with connect back code. Written for Slackware 8.1, 9.0, 9.1, and RedHat 7.2.
4871cfddef91c577c554b14dfdaf2472474b595033fe12ccb112b6a54d289e32
webfs 1.7.x remote root exploit that binds a shell to port 26112 and makes use of a User-Agent buffer overflow.
b99a529cd0c9633b8757d0805ef4ef7815dc5ea637c2438a987d2ca956da300b
pServ 2.0.x Beta webserver remote exploit that makes use of the User-Agent HTTP Header buffer overflow.
5c7a46786ee5ec0c5d78688145e1527fbd30b89d6df3a01b81f5ebb54be1a36d
Ph4nt0m Security Advisory #2003-9-9 - mah-jong versions 1.6 and below are susceptible to a remote denial of service attack.
9f7ebf87e359ccad366264bb0a277e015fb72bb0f3f9f57fae88ca20d2a63c19
Remote exploit for Cfengine versions 2.-2.0.3 that makes use of a stack overflow discussed here. Binds a shell to port 26112. Tested against RedHat.
3d6399d602afc8e1234d04097ff5ebf01664d6980f11dcdde0306ddfc376b787