e_Board version 4.0 is susceptible to a directory traversal attack.
49d8fea77c51cbb9c27281fce5a2c3752fd4ca40015f0bcfc4732b0dc78b8891
WoolChat IRC client is susceptible to a buffer overflow when a DCC send query is sent with more than 260 bytes.
a6d1f6823641006525e6c0878dfea4547cacc36a01aca5c25c1b55a0cb0a6157
w3m remote buffer overflow exploit for FreeBSD. Runs as a daemon and waits for w3m to connect. FreeBSD advisory about w3m here.
e30d5cf756ffae77685d87c6188e5ef50c5a9115816fc507d00772618b363043