Insecure Programming by example

Here you can find a collection of exercises that will help you teach yourself the art of insecure programs exploitation. It's not complete, but it's minted to open your mind. The idea is NOT to use any human help. In case you doubt it, we could exploit all but two of them, stay calm and good luck.
get them all
All credit for these to: http://community.coresecurity.com/~gera/InsecureProgramming/, this is just a mirror since it is down indefinitely.
WARMING UP on STACK
#1
#2
#3
#4
#5

ADVANCED BUFFER OVERFLOWS
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10

FORMAT STRINGS
#1
#2
#3
#4
#5

SIGNALS
#1
#2
#3
#4

ESOTERIC
#1
#2
#3
#4
#5

StackGuarded
#1
#2
#3
#4
#5
#6

Numeric
#1
#2
#3
#4
#5