Rémi Denis-Courmont

6 exploits Active since May 2004
EIP-2026-118517 EXPLOITDB c WORKING POC
eMule/xMule/LMule - OP_SERVERMESSAGE Format String
CVE-2004-0176 EXPLOITDB c WORKING POC
Ethereal - Buffer Overflow
Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors.
CVE-2004-0633 EXPLOITDB c WORKING POC
Ethereal <0.10.4 - DoS
The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.
CVE-2010-0437 EXPLOITDB c WORKING POC
Linux Kernel < 2.6.26.8 - Denial of Service
The ip6_dst_lookup_tail function in net/ipv6/ip6_output.c in the Linux kernel before 2.6.27 does not properly handle certain circumstances involving an IPv6 TUN network interface and a large number of neighbors, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via unknown vectors.
CVE-2005-2973 EXPLOITDB c WORKING POC
Linux <2.6.14-rc5 - DoS
The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
CVE-2005-2709 EXPLOITDB c WORKING POC
Linux kernel <2.6.14.1 - DoS
The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.