Remi Denis-Courmont

7 exploits Active since May 2004
EIP-2026-118515 EXPLOITDB c WORKING POC
eMule 0.2x - AttachToAlreadyKnown Double-Free
EIP-2026-118516 EXPLOITDB c WORKING POC
eMule 0.2x Client - OP_SERVERIDENT Heap Overflow
CVE-2004-0633 EXPLOITDB c WORKING POC
Ethereal <0.10.4 - DoS
The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.
CVE-2004-0184 EXPLOITDB c WORKING POC
Tcpdump < 3.8.1 - Integer Underflow
Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.
CVE-2005-2973 EXPLOITDB c WORKING POC
Linux <2.6.14-rc5 - DoS
The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
CVE-2005-2709 EXPLOITDB c WORKING POC
Linux kernel <2.6.14.1 - DoS
The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.
CVE-2010-0437 EXPLOITDB c WORKING POC
Linux Kernel < 2.6.26.8 - Denial of Service
The ip6_dst_lookup_tail function in net/ipv6/ip6_output.c in the Linux kernel before 2.6.27 does not properly handle certain circumstances involving an IPv6 TUN network interface and a large number of neighbors, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via unknown vectors.