lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: list.account at cerdant.com (List Account)
Subject: The *real* reason the pivx unpatched IE flaws page was taken offline?

Thanks, its a start. No surprise it's unavailable. 
 
 
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
Tonneson, Thomas
Sent: Thursday, December 11, 2003 9:23 AM
To: 'Jelmer'; full-disclosure@...sys.com
Subject: RE: [Full-Disclosure] The *real* reason the pivx
unpatched IE flaws page was taken offline?



>From Dec 2002
 
http://web.archive.org/web/20021205094932/http://www.pivx.com/lar
holm/unpatched/
 
There was another Feb 03 but it seems unavailable.
 
Cheers

Tom Tonneson
 

-----Original Message-----
From: Jelmer [mailto:jkuperus@...net.nl]
Sent: 11 December 2003 12:41
To: full-disclosure@...sys.com
Subject: [Full-Disclosure] The *real* reason the pivx unpatched
IE flaws page was taken offline?


 
On 12 october PIVX removed the IE unpatched IE flaws page "for
the good of the internet as a whole"
 
http://slashdot.org/article.pl?sid=03/10/12/2221205
<http://slashdot.org/article.pl?sid=03/10/12/2221205&mode=thread&
tid=109&tid=126&tid=128&tid=172&tid=187>
&mode=thread&tid=109&tid=126&tid=128&tid=172&tid=187
 
Now looking thru the pivx client list
http://www.pivx.com/clients.html the *real* reason becomes
blantantly obvious.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031211/33363ac1/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ