7350854 - x86/bsd telnetd remote root exploit which takes advantage of the AYT buffer overflow. Tested against BSDI BSD/OS 4.1, NetBSD 1.5, FreeBSD 3.1, FreeBSD 4.0-REL, FreeBSD 4.2-REL, FreeBSD 4.3-BETA, FreeBSD 4.3-STABLE, and FreeBSD 4.3-RELEASE.
042fbb8216e3f92fad1e57df03d06a841a1450db42a5c0124584533b112dc627
Aimrape is a remote denial of service exploit for AOL Instant Messenger (AIM) v4.7.2480 and below.
c17d8ee6398376f4d724d76f59aaa21ddccf273248b5f1d0ea64858425f4c21c
Majordomo v1.94.4 local exploit in perl. Binds a shell to port 1234 with uid=Majordomo.
3a1bfea6bba3d9ea6fd7f66f9211de9ecce5dbe5b859d9ffa9613bbeeeb45ced
Majordomo v1.94.4 contains vulnerabilities which allow local users to obtain a uid=majordomo shell.
f73ece74f87e2fff78d541fca10443ea2833f826616305f86792de0c8030f123
The Oracle 9i Application Server uses the Apache web server for HTTP service. However, if a request is made for a non-existent .jsp file, the complete path is shown.
7664fb9699f9153f8a29bd25293535535a769474ec51aaf0571f6595ea53e20b
Kazaa and Morpheus remote denial of service exploit in perl - Floods the server using non-rate limited shared folder connections.
fad2ef1d6bd1b6f628e4df197195a0a3e50c0c953de697287632b21c00b8e1d3
A code red mass fix/abuse tool.
440b46e44ac239053727c665adfcf7a7c038fef3ee72cbc011b1cc58bba8decb
Denial of service attack against a 3com ADSL 812 router in Java. Resets the router without any password, as described here.
d2792e361535aff3141ac4bf948fa9e4f4c5ce5511f168232427b077a1eb4325
Cso.c is a remote exploit for cgicso included with cgiemail 1.6. Tested on Slackware Linux 7.1 running Apache 1.3.20.
8d232fa0a2687a8c7dc294c61bb1c84b0a1be65bdeb8565fa7f6f9fa693a87cb
Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.
552b77283bca7bfe71ead2e26048f4a7c53545e50aaf62baa7867718bbf668db