Description of a simple buffer overflow attack against older IMAP servers developed by the University of Washington.
801b38cc3b6e3bf19304acdeb6078697e05b7feabd89dcdfedd58d3099098ccd
A backdoor which waits for an ICMP packet and then connects with a UDP server on the client. v0.2
f7ee9dcfe3b1e7c2bde267a0510f1210573dc52b3c5ad843f4436f19feec2445
Thorough analysis of the buffer overrun in the Windows RPC interface that was discovered by the Last Stage of Delirium. Exploit included for Windows 2000 SP4 Chinese version.
6a46de63d03e6910e4235d4653d7f7572b05b83813037adebbcf6a580f52cbe1
Opera version 7.0 and 6.12 is vulnerable to a buffer overflow that results in a crash when redirected with a long URL.
9ba3231d475b450b82ab4bcb3dac5dbc752e08e1814ab64a42481436815ecd0d
Gobbler is a tool designed to audit various aspects of DHCP networks, from detecting if DHCP is running on a network to performing a denial of service attack. Gobbler also exploits DHCP and ethernet, to allow distributed spoofed port scanning with the added bonus of being able to sniff the reply from a spoofed host. This tool is based on proof of concept code "DHCP Gobbler" available from networkpenetration.com and the DHCP flaws paper.
28547ebff2666e8695d9c5e76a8063c0a32e0fc3e55e54aa0f70c4206c761b56
Paper discussing utilization of port zero for OS fingerprinting and how to protect against it.
bbe9a71a165db0e8b2e6a2f2d5c437c544faf4ba99ad3d4c8737d4bf2ef584a0
Paper discussing utilization of the Win32 exploit for the DCOM RPC vulnerability.
ac991411216d76522190300a8ee9d05dc9d1eee9a92a9af2f72a6cffa66b6bb9
Remote root exploit for samba 2.2.7a and below using reply_nttrans(). Written for the Linux x86 platform.
d92d52b7bdffc81559e9c811bfbce60c3ac57434a8318be8a5f08c724eaa127b
Windows port of the remote exploit utilizing the DCOM RPC overflow originally coded by H D Moore.
98186a16043a537eb59eec975695e217b9043d1747d7a414c37c888c6b72be38
Remote exploit utilizing the DCOM RPC overflow discovered by LSD. Includes targets for Windows 2000 and XP. Binds a shell on port 4444.
aac1c914909b279cffcee8699eff0774f5962b99d0dbd3ed2a80f12fa7a64d4a
An interesting bug in the Mitel Voice Over IP system that allows an attacker to discover phone numbers calling through the DHCP server.
1ed33fcc27a383016afe3811d1aa56ff46a4cdcfdf95bf1b10d6082b6b4ffcdb
CERT Advisory CA-2003-18 - CERT announces that a set of integer overflows exists in a DirectX library included in Microsoft Windows. An attacker could exploit this vulnerability to execute arbitrary code or to cause a denial of service.
eafbaabf97c03108de6117e44f1d1a3d553ac31d3dabf02f3f7f03ac596520c5
NGSSoftware Insight Security Research Advisory #NISR25072003 - In an attempt to fix previous vulnerabilities discovered by NGSSoftware, the Oracle RDBMS fix patched the hole but left a logging function vulnerable to a stack overflow.
237dd712fc93400a7d9eed9e111f3ab5238fd5fcb2322857fa12ec0d69be3187