BSDI 3.0 /usr/bin/suidperl local root exploit.
58941d3c91d8b42f6784c8091f0c39755ddd7d5f6ad6a1825b63d7ab8c720c3c
BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.
ed628d1321ba3d0225a71dc5d95a94974deec4e382e6feef884016cddda04dd0
BSDI Elm 2.4 local buffer overflow exploit. Tested on BSDI/3.0, gives a group mail shell.
6a330ce2fc59bf584d239c77e5b345d9e7bb1abdf51acce4a1c2b43634c09ae2
Gnomehack v1.0.5 local buffer overflow exploit which gives a egid=60 (games) shell if gnomehack is sgid (2755), tested on Debian 2.2. The same bug also affects Nethack.
816be742420d036d0db3dc9087eb0fb8b2fcf51694ed67304fa2c176d19a55ca
BSDI /usr/contrib/bin/filter v2.* local buffer overflow exploit. Tested on BSDI 3.0, provides a shell with GID mail.
e534fc0c8aa82b47dead2e0e671e1935ad2cdccabd46b611e35f366b86b24a78
Restore (/sbin/restore) v0.4b15 local root exploit. Tested against Redhat 6.2.
25b1655a9902e87c0615e5d189cded02d9d32a74028c352acca92baf010d53b9
Linux /usr/games/zarch v.92 local root buffer overflow exploit.
d420c219019c22b1db498fbe394d018774d0fc7f953b8a9a311f957a40202d37
Linux space plumber (/usr/games/splumber) local buffer overflow exploit.
807d031351ea5f76324fc2b5994894828847822ca1112cab19cbaff5f38514e9
Gopher2.3.1p0 and below has many overflowable functions in the daemon. Most of them overflow with hardcoded data that gets passed along - making it not possible to change any pointers. The "halidate" function contains an exploitable buffer overflow - exploit code for linux included. Note: This is not related to the other vulnerability, authenticate.c, which has since been patched in 2.3.1p0. 2.3.1p0 is vulnerable to this.
c9a967732b2e2119e924d33a9e324290a5f84f712275f52f3cd713c43b128f87
BNC 2.6.4 remote denial of service exploit. Causes all users who are connected to IRC by BNC by exhausting the resources of the BNC server.
2b404efc7917d8d05e17566fbbda6f862e58ad17893ed5aac38f790bba57dbeb
Slrnpull.c exploits a local buffer overflow vulnerability in slrnpull version 0.9.6.2, which is setgid news. Tested against RedHat 6.2.
416129da6ec1a149669dbfa4d033e8be06cf479f020fc5eefda50e6ade9d3fc9
Gopher+ daemon v2.3 remote root buffer overflow exploit - Tested against Slackware Linux 3.6 and 7.0. Adds a line to /etc/passwd.
9c2f2d4a91a62e040ddd61ebd3561c42d0097168294f3951f1f9d91c91fab2e1
Tin v1.4.3 local linux/x86 buffer overflow exploit which spawns a gid=news shell if /usr/bin/tin is setgid.
a8dfb59501a701151245b97b74716f47642a1e40df90d8842f5f19a4ea396324
The Dune Webserver v0.6.7 has remotely exploitable buffer overflows. This code is a proof of concept exploit for linux/x86.
959582ca4a5d776e191b1bf9c713d5e8b9a9f1b81e495b3b70a6368fbe9afa9f
Tetrinet v0.6 for linux denial of service exploit. If a user on the local network sends an encrypted string and disconnects before the login is completed, the Tetrinet server exits with a broken pipe.
eade1092a1446a89cdd3abe32e722299cf310cac965b8038dcba3b09b7b7ca8f
Getenv.pl allows you to find buffer overflows in a unix binary by finding getenv() calls.
57f50d3ff335c0dfd414ed424f6a20d8849ef9b8d0e14b9e739b7a6b33927a50
xfwm buffer overflow exploit for Linux / x86. This will give you a euid=0 shell if /usr/X11R6/bin/xfwm is SUID(=4755), which isn't anywhere by default.
43eac56faef522e18d373dc452cee020f39fd7369f6f0bda40e910c89734352f
xwhois buffer overflow, for Linux x86. This will give you a euid=0 shell if /usr/X11R6/bin/xwhois is SUID(=4755), which isn't anywhere by default.
cd3e6d87b5d6caa673ead4be3dac43675e7efaff01e57544d0ab5add0bd7a2fc
Dopewars 1.47-current has two local security holes. Dopewars is SGID games. Remote buffer overflows also exist.
0f42ff1b37e66d07b86bb87e247d94963fa74c6ecd4315816a593792519e5108
Inews (inn-2.2) local buffer overflow - provides a gid=news shell if /usr/bin/inews is SGID. Includes perl script to find the offset.
b6fc73939a2932fcb984c5650ed44060c75fc8ec9c6504577440ac635fc07b5b
Pine v4.10-21 local buffer overflow - drops a gid=mail shell if /usr/bin/pine is SGID. Tested on Debian slink2.1.
7764b61d5684322567f4c2b7d67debaf0db0e2c30bbcecd3de3c2f2533e14b92
Wmnetmon v0.2 buffer overflow exploit for Linux - Provides a euid=0 shell provided /usr/X11R6/bin/wmnetmon is suid root, as it is by default. Includes perl script to try all offsets.
86bef23e564b83a03659996407371bf9b0c8902fe578e15b80db3ca10affd2eb
/usr/bin/Mail local linux exploit which gives gid=12 shell. Tested against Slackware 3.6 and 7.0.
fed3606029a826006dd84ce7fd68f8f7eb73b112fa86dd79c0364186eaf429cf
Slirp v1.0.10(RELEASE) local buffer overflow exploit for Linux which gives you a SGID shell if /usr/local/bin/slirp is mode 2755. Tested against Slackware 3.6. Includes perl script to find the offset.
12e61b047e8d24718f434c4d48b7b220b125ea133744046125a247842e78d76a
One last elm v2.4 / v2.5 exploit - gives EGID 12. This version works against almost all vulnerable versions of elm.
47fefa5230db61d38f353f0a5b82b73f911a8e966cb50c54a8092a788c5e4d9e