lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: exploits at zataz.net (ZATAZ)
Subject: Credit Card data disclosure in CitrusDB

Hello,

As Maximillian Dornseif say's they are "unpublished". Look the ""

If they are on the website off Red Team so they are "published" to 
every body.
Just browsing on the website after searching into the advisory part of 
Red Team website.

I was also suprised to find this adviso on the website.

Regards.

Le 13 f?vr. 05, ? 16:04, Thierry Zoller a ?crit :

>
> Salut ZATAZ,
>
> Well they probably wanted to wait with the release until the vendor
> fixed the flaws, how about that? Now they're published thanks to you,
> maybe next time you simply don't send these question to a mailinglist 
> but
> to them in private?
>
>
> Note to "Red Team":
> Setzt die perms euer release dirs doch bitte anders:
> http://tsyklon.informatik.rwth-aachen.de/redteam/advisories/
> Dann passiert das auch nicht.
>
>
> -- 
> Thierry Zoller
> http://www.sniff-em.com - Packet sniffer
>
>
>
Cordialement

-----------------------------------------------------

Eric Romang / ZATAZ / ZATAZ Internet
Co-fondateur de ZATAZ
President Association ZATAZ Internet
eromang@...az.net
http://www.zataz.com
GSM : +352 091 600 404
B.P. 311
59474 Seclin Cedex
France
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 1244 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050213/79cfc2e2/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ