nbSMTP version 0.99 remote format string exploit. Tested on Slackware Linux 9.0, 10.0, and 10.1.
10190d51efb7acc9891701971fa67cb9aa231b76267cf93d3c6f21332ddb0dbc
GNU Mailutils imap4d version 0.6 remote format string exploit. Tested on Slackware Linux versions 9.0, 10.0, and 10.1.
401bc6296bf7e0cad8ec471e000d36ed641cd07f6b35a73673bd4b9fb17f3e30
Remote root format string exploit for ngIRCd versions 0.8.2 and below.
3bce927e902f7ca909e92e7eb8dc3a4ad7a7c023c9b35cd53da4f9616806087b
No System Group Advisory #11 - A remote format string vulnerability allows for remote compromise in ngIRCd versions 0.8.2 and below.
96de964f6c9f6524960796f00b664e8a1641d0a7bc83200a1bb58606d2b98cdb
IBOD 1.5.0 and below local proof of concept buffer overflow exploit.
9a604874ed4c3a5442bb00dbf27ccce5d305c9bfed784c062e3cd4b3737e97fb
Remote root exploit for Citadel/UX versions 6.27 and below that makes use of a format string vulnerability. Tested against Slackware 10.0.
67940d624ed15be6a8a2ef3aa01c6a2a06b90ceb459471a189933677b5d6e4b8
No System Group Advisory #09 - Citadel/UX versions 6.27 and below suffer from a format string vulnerability that allows for remote root exploitation.
4696971823e199337cff698d475784868739e6f9e92bff094b13b9b3806b7141
TipxD versions 1.1.1 and below suffer from a local format string vulnerability. Proof of concept local exploit included.
bd7c3d962bfd392f9d0af4f86b1f47acbfce58b9232069d15848c54ccdb24870
Proof of concept exploit for Socat versions 1.4.0.2 and below that makes use of a format string vulnerability.
9ed0cf58b0b7dd6a47511b5d8f0661f3c0f25236007227a0b310775686548d06
Local exploit for flc versions 1.0.4 and below. Note that flc is not setuid by default and this is completely proof of concept. Tested on Slackware 10.0.
418b63d366a109a7ec708279fa5ce175e8923a21150f47f353a099403ad65f4c
The dupescan binary from glFTPd versions 2.00RC3 and below suffers from a stack overflow that can be exploited locally. Full exploit included.
160289b0841eaee7d277dbda03e49e1139d4b00c48d005bd5958349f4609a988
Citadel/UX versions 6.23 and below are vulnerable to a buffer overflow that occurs when more than 97 bytes are sent with the USER directive to port 504.
aea378e63801bac88b6f441bca646722e75b24e31337df108dde36bc21e66ee6
Exploit that makes use of the mod_userdir vulnerability in various Apache 1.3 and 2.x servers. Ported to Windows by John Bissell.
fd00f9773c4596c9142305598ecee7f1d725ed3b3692b9348414e4cd20e373f2
Exploit that makes use of the mod_userdir vulnerability in various Apache 1.3 and 2.x servers.
8675f32c6af2043f644707d59bb74ae4eaf2e430aa1fb582122c2f9c86d7012a
Utility that attempts to find whether or not users exist on an SMTP server using the EXPN command against a list of user names.
73346010d346ef624f1a57c55f0aaafd2fb9476ea1e7678b6e797981f5d167fb
Tool for cleaning WTMP, UTMP, and lastlog under Linux.
59aa2101b05225dd0eb7e7b456eb26357540723e3c1d8a10deca83e9715a10fb