Buggyzilla.pl exploits two vulnerabilities in bugzilla 2.14 or prior in order to execute commands on affected systems. This uses bad quotation of user input in bugzilla to gain access to administrator pages. The a weakness in the reports.cgi is then used to allow execution of commands. Advisory available here.
3e2376615b934217d9ee3fabfaf8b0934c68e5e806151b15baa23d51a10793ba
VMware v1.0.1 local root exploit. Tested on Redhat 5.2 and Slackware 3.6.
4279e1d7f7970f9144228a7785457dd44a0425aaae3385a41041a119328a851d
Jidentd 1.0 IDENT server remote exploit. Tested under Slackware 3.6 and 4.0, Debian 2.1, Redhat 4.1, 5.0, 5.1 and 5.2.
9bb5daf2edcaff51a09bef34d3664fe3ceeb2793878de4d7c1634fcf15c2396a
Netwin ESMTP Server v2.7q linux x86 remote exploit. Tested on RedHat 6.1, binds a shell to TCP port 30464.
f6229c6e2a67eb3307f3fb307b27985b9446209516295d99dc899bca3fe60903
Elm 2.4 PL25 local GID mail exploit. Tested under Slackware 3.6, 4.0, Redhat 5.0, and 5.1.
558a726bce68d1bb599a32adc7f23c60678255c07a67495d810c8a54c8097694
Mailx local exploit - Tested on Slackware 3.6, 4.0, and 7.0 and Debian 2.0r2, 2.1, 2.2. Gives GID mail shell.
a39f3080841f007cde7492636ec28cae360eb3bb27286828a964f551aab0e2c5
imwheel local root exploit (as discussed in RHSA-2000:016-02).
c9ef8294aec65f46d63ce7f67c062e2ee9fa22a942d8fbaa5505c062851c439d