what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files from Leon Juranic

First Active2004-09-15
Last Active2018-01-24
auth_radius.c
Posted Jan 18, 2005
Authored by Leon Juranic | Site security.lss.hr

Apache mod_auth_radius denial of service exploit that makes use of an integer overflow. All versions up to 1.5.4/1.5.7 are affected.

tags | exploit, denial of service, overflow
SHA-256 | f7ff7f47f7ce5c52334025dc09ef1c15014686b6928c566e2615a001bbaf8e23
LSS-2005-01-03.txt
Posted Jan 12, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-01-03 - There is a privilege escalation and arbitrary file read vulnerability in ftpfile, the Squirrelmail Vacation plugin. Version 0.15 is affected. Detailed exploitation provided.

tags | exploit, arbitrary
SHA-256 | 7688f4089c87f00981c0f9d4b007b41913c9605ad778a2cfa060942962b562f8
LSS-2005-01-02.txt
Posted Jan 12, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-01-02 - The Apache module mod_auth_radius suffers from an integer overflow. All versions up to 1.5.4/1.5.7 are affected.

tags | advisory, overflow
SHA-256 | b3fc79d5d6b5d350e5fd36c5491d811daff89c0d3ff0d81ec9bd70677ec70c62
LSS-2004-11-3.txt
Posted Nov 12, 2004
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2004-11-3 - There is a buffer overflow vulnerability in getnickuserhost() function that is called when BNC 2.8.9 is processing responses from an IRC server.

tags | advisory, overflow
SHA-256 | 02fa0c273544d6c6d6ca526d37deda64a325e297648c1b5d576c8fe3f8f09317
proftpdEnum.c
Posted Oct 26, 2004
Authored by Leon Juranic | Site security.lss.hr

Remote proof of concept exploit for the ProFTPD 1.2.x user enumeration vulnerability.

tags | exploit, remote, proof of concept
SHA-256 | 1a9f67d4e3a545bb044fe39bd1c9b16e5d474cf940899ecfd73d586444949990
proftp-userdisc.c
Posted Oct 16, 2004
Authored by Leon Juranic | Site security.lss.hr

Side-channel username verification against ProFTPd. Sends the USER command, and sees how long the server takes to respond, indicating whether the user exists or not. Obviously, this may produce false positives on slow network connections.

tags | exploit
SHA-256 | 4c187c9a5ac561e7d40e6812cf15bf9b2bcd4aaf7a0db96b65136cfb08a387f5
sus202.txt
Posted Sep 15, 2004
Authored by Leon Juranic

SUS versions 2.0.2 has a format string vulnerability in the log() function that allows any local user to gain root privileges.

tags | advisory, local, root
SHA-256 | 106d733f1d36f9b0e8b648040d07d178e88abf9759aaef5a23f2f5eecd87daea
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close