Quote Originally Posted by ShadowBane View Post
Really, any of the remote root exploits listed here would allow the installation of bootloader viruses...

Bootloader exploits are attractive because they are very hard to detect from a booted computer. There is no reason to expect that people using Linux would never be targeted by such attacks.
Sure nice database of non-working exploits(hint: outdated) , very valuable for studying.