Apache mod_auth_radius denial of service exploit that makes use of an integer overflow. All versions up to 1.5.4/1.5.7 are affected.
f7ff7f47f7ce5c52334025dc09ef1c15014686b6928c566e2615a001bbaf8e23
LSS Security Advisory #LSS-2005-01-03 - There is a privilege escalation and arbitrary file read vulnerability in ftpfile, the Squirrelmail Vacation plugin. Version 0.15 is affected. Detailed exploitation provided.
7688f4089c87f00981c0f9d4b007b41913c9605ad778a2cfa060942962b562f8
LSS Security Advisory #LSS-2005-01-02 - The Apache module mod_auth_radius suffers from an integer overflow. All versions up to 1.5.4/1.5.7 are affected.
b3fc79d5d6b5d350e5fd36c5491d811daff89c0d3ff0d81ec9bd70677ec70c62
LSS Security Advisory #LSS-2004-11-3 - There is a buffer overflow vulnerability in getnickuserhost() function that is called when BNC 2.8.9 is processing responses from an IRC server.
02fa0c273544d6c6d6ca526d37deda64a325e297648c1b5d576c8fe3f8f09317
Remote proof of concept exploit for the ProFTPD 1.2.x user enumeration vulnerability.
1a9f67d4e3a545bb044fe39bd1c9b16e5d474cf940899ecfd73d586444949990
Side-channel username verification against ProFTPd. Sends the USER command, and sees how long the server takes to respond, indicating whether the user exists or not. Obviously, this may produce false positives on slow network connections.
4c187c9a5ac561e7d40e6812cf15bf9b2bcd4aaf7a0db96b65136cfb08a387f5
SUS versions 2.0.2 has a format string vulnerability in the log() function that allows any local user to gain root privileges.
106d733f1d36f9b0e8b648040d07d178e88abf9759aaef5a23f2f5eecd87daea