These exploit experiments exploited a few well-known vulnerabilities and gained root privilege as result.
Reverse engineered a web server using IDA pro and explored its vulnerabilities. Sploit1 bypassed DEP and successfully gained root access. Sploit2 bypassed ASLR and successfully gained root access.
a, b, c, d, e exploits/accomplishes, respectively, Cookie Theft, CSRF, SQL injection, Password Theft and XSS.