This is a small proof of concept tool that leverages the data:// stream to gain remote code execution from a file inclusion vulnerability.
c8c8bbfa963434111dffb850c77790720a4f7b2c74f7310ff876ccea44eb66f6
rdate version 1.4 is susceptible to a format string vulnerability. Notice: It is likely that this is a benign vulnerability in that rdate is not setuid by default.
5542ec0fb3fe5a1ae95e93e3229447e7fdaee199e2c20e4244a6bae013b858fd