A short paper discussing exploitation of vulnerabilities consisting of a null byte written passed the end of a dynamically allocated buffer.
0e1f36dccb0e9ef58428ac810760e9e766e92f7934ec298303105f871f0ca1b2
NGSSoftware Insight Security Research Advisory #NISR2406-03 - WebAdmin.exe, a utility that allows remote administrators to control MDaemon, RelayFax, and WorldClient, has a remotely exploitable buffer overrun in the USER parameter that would allow a remote attacker to execute arbitrary code on the server.
6792c533a2cd9f5fcacddb71b75e2176618d3457d31728ba0246ae3dfa98eb02
SGI Security Advisory 20030607-01-P - Several bugs in the IRIX 6.5.19 implementation of IPv6 result in inetd becoming hung when port scanned, snoop unable to handle packets as root, and other non-security related issues.
0fdaa24f936f93dd53593bf93d40a3969220454aeead17be748bfea6c4c28e2d
Kerio Mail Server 5.6.3 remote buffer overflow exploit. Adds wide open root account to /etc/passwd. Written based upon the vulnerability discussed here.
9b6caaf215dc0b765ded6013c36c55a7897e80b242d716bc226a4ac4ccb0eef0
This utility provides a datalink bridge working in userspace that allows captured packets from one ethernet interface to be retransmitted over a non-ethernet interface.
355b995aacd7f973a646ba0ca1367d3513bf89b8f6e5d75ad0b770fab636891b