This Metasploit module exploits a vulnerability that can be used to modify portions of a process's address space, which may lead to privilege escalation. Systems such as FreeBSD 9.0 and 9.1 are known to be vulnerable.
9d8c78182da26e1da3cf3977d1da297ce969b5376665d620df728cbdcad3f431
FreeBSD versions 9.0 and 9.1 mmap/ptrace privilege escalation exploit that leverages the issue described in FreeBSD-SA-13:06.
33ab3cd2db81ca119a894609c3cbec29fc118789f6df44a99945d5cda231b71c
RoundCube Webmail versions 0.2b and below remote code execution exploit.
f510b021ba4086a9fe8abba8d5295afa395890c7b73d7ad0f34567a43f3aa689
OpenBSD version 4.2 rtlabel_id2name() local null pointer dereference denial of service exploit.
e6048f3df28916db43a3c358ab3e2cb1df30acf67d97bf7363018319818cbcbc
Local root exploit for chfn under SuSE Linux 9.{1,2,3}/10.0, Desktop 1.0, UnitedLinux 1.0, and SuSE Linux Enterprise Server {8,9}.
d6f60a4c747ccc20d91eb071b663dd492f8bab5c73280fa823a145e795a28096