lbreakout2 versions 2.4beta-2 and below local exploit.
51e14a7159f51e0c9c23bf324116ff606ddd4adc0e76e11198615b14ef9e8a41
Remote exploit that makes use of a buffer overflow during GET requests in the PSOProxy server version 0.91.
73f0d6e8adffd79bbf923eab06a241c867975c0e85912c18f2cc7a407730bc67
Remote exploit that makes use of the try_netscape_proxy() overflow in versions 2.3 to 2.6.9 of lftp.
816d755b95467dc00ab06edb3f6891bcfd9a118f8f8af795a90ab0f3b444ba8a
EPIC4 remote exploit that acts as an IRC server and makes use of a stack-based overflow in EPIC4 versions later than pre2.003. Upon success, this exploit yields a shell with the privileges of the user id connecting into the server.
273d77c8e43b800a86bb9732a9c1177bb69c666f29a6a87155e45205edc257b2
UnAce version 2.20 local proof of concept exploit. Original vulnerability discovery made by MegaHz. Bruteforcing option included.
d191042bbe5c634e4f3a8ef7041d81538d5210cf278f7e65753a216a082b7361
TerminatorX version 3.81 and below local root exploit. Bruteforcing option included. Makes use of vulnerabilities discussed in this related advisory.
d2ae0f1ca62a0e762c3a10af9db9cf6b2ec2a061ba6c99cecdfaeadde1df7ea5