No information is available for this file.
f62eef6670170a250234158524be8d6f6715d662c474efd9fbfba35824e0671e
No information is available for this file.
7429e8453a65ff643c164652ce880cb315b7f264348524ed5d2416bdb1720229
No information is available for this file.
f75f4a70916f4dfdce26d2dd5de80e2068a56492e813665b9d18994ac3b72926
No information is available for this file.
5196d48a79c7001ec559999a1afb98bf8b5107f02541318b7d3040c1e1a9d90a
No information is available for this file.
d44464e43055ef754baf7da9e6ae4ffc34d946f42cbf371754096abb9fe75bd9
No information is available for this file.
b33725faabe318b1b79454cb545c289ce122a0f47a860e3ffe7f1b8f4470138a
Excellent whitepaper/tutorial on Heap/BSS-based overflows, including very thorough explanation of what heap-based overflows are, several methods of exploitation, demonstrations, and some possible solutions/fixes.
5e75e6302f280fc0e1ee1bb212add9cca029460e216a013a8e73773a4ed48d27
No information is available for this file.
cc5415606eb605c932ca9ca4db023464c859111edda8cbb4d918ac803630e782
No information is available for this file.
610468fd42104c37b1f3e21255d40c4604c207e879676c6d9a580862a4ec6c38
No information is available for this file.
f015d074e338b2313bacac26f5824782d8d0eda4e90af1725c3e5812fc82a65c
No information is available for this file.
fd2fe05f10c0c954491cf6f38679b1f1df08e955de77219a3751617c6de5b358
No information is available for this file.
ea2bd54bef13ec4149ad55f7c434907d56a7ce1be1a66315a09e3547df7177d6
No information is available for this file.
6cff1719d4494f992d3752e8819f71c4d0b1ff59d453f2744a067034510a6264
No information is available for this file.
efc243c56a429c7dac6b48a66c5edd88d40059bfd1dab628abc64a6f235ca4c2
The original Phrack article called Smashing the Stack for Fun and Profit.
07f340561594d32efbd82143ba755296bf319eea010253a0eb2378832622a292
"Protecting Against Some Buffer-Overrun Attacks" - An excellent analysis of buffer overruns, with example exploit code included.
a671b0794f0eca75a0953950e9ef0508388ad78fe47b63e3f506026c8f696450