what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files from Leon Juranic

First Active2004-09-15
Last Active2018-01-24
auth_radius.c
Posted Jan 18, 2005
Authored by Leon Juranic | Site security.lss.hr

Apache mod_auth_radius denial of service exploit that makes use of an integer overflow. All versions up to 1.5.4/1.5.7 are affected.

tags | exploit, denial of service, overflow
SHA-256 | f7ff7f47f7ce5c52334025dc09ef1c15014686b6928c566e2615a001bbaf8e23
LSS-2005-01-03.txt
Posted Jan 12, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-01-03 - There is a privilege escalation and arbitrary file read vulnerability in ftpfile, the Squirrelmail Vacation plugin. Version 0.15 is affected. Detailed exploitation provided.

tags | exploit, arbitrary
SHA-256 | 7688f4089c87f00981c0f9d4b007b41913c9605ad778a2cfa060942962b562f8
LSS-2005-01-02.txt
Posted Jan 12, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-01-02 - The Apache module mod_auth_radius suffers from an integer overflow. All versions up to 1.5.4/1.5.7 are affected.

tags | advisory, overflow
SHA-256 | b3fc79d5d6b5d350e5fd36c5491d811daff89c0d3ff0d81ec9bd70677ec70c62
LSS-2004-11-3.txt
Posted Nov 12, 2004
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2004-11-3 - There is a buffer overflow vulnerability in getnickuserhost() function that is called when BNC 2.8.9 is processing responses from an IRC server.

tags | advisory, overflow
SHA-256 | 02fa0c273544d6c6d6ca526d37deda64a325e297648c1b5d576c8fe3f8f09317
proftpdEnum.c
Posted Oct 26, 2004
Authored by Leon Juranic | Site security.lss.hr

Remote proof of concept exploit for the ProFTPD 1.2.x user enumeration vulnerability.

tags | exploit, remote, proof of concept
SHA-256 | 1a9f67d4e3a545bb044fe39bd1c9b16e5d474cf940899ecfd73d586444949990
proftp-userdisc.c
Posted Oct 16, 2004
Authored by Leon Juranic | Site security.lss.hr

Side-channel username verification against ProFTPd. Sends the USER command, and sees how long the server takes to respond, indicating whether the user exists or not. Obviously, this may produce false positives on slow network connections.

tags | exploit
SHA-256 | 4c187c9a5ac561e7d40e6812cf15bf9b2bcd4aaf7a0db96b65136cfb08a387f5
sus202.txt
Posted Sep 15, 2004
Authored by Leon Juranic

SUS versions 2.0.2 has a format string vulnerability in the log() function that allows any local user to gain root privileges.

tags | advisory, local, root
SHA-256 | 106d733f1d36f9b0e8b648040d07d178e88abf9759aaef5a23f2f5eecd87daea
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close