Pound versions 1.5 and below local and remote format string exploit. Only works locally if pound is setuid.
d32c4eb64924cacbd6138fbf93daad2d980fde8fa9dea7eb17cdfb06d23df785
Monit versions 4.2 and below remote exploit that makes use of a buffer overflow in the handling of basic authentication. Binds a shell to port 31337.
ba0446ecc2f07da2a2e4e121bf6475f2fd33ff6fdc434504fec164c267d88c3d
Ethereal IGAP Dissector Message overflow remote root exploit that spawns a shell on port 31337. Makes use of the vulnerability that exists between versions 0.10.0 to 0.10.2. Tested under Gentoo and RedHat 8.
e66736e8f6c88b3f65c10debc6650dc308d86154626ac036dbc5e4f7693e4f95