lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 13 Jun 2012 07:53:09 -0500
From: Fatherlaptop <fatherlaptop@...il.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Full-Disclosure

I NOW am no longer so much a supporter of bug hunts. Looks more and more like witch hunts. 


From: Randy

It's an iPhone Thang!
Was learning cursive necessary?

On Jun 13, 2012, at 6:00 AM, full-disclosure-request@...ts.grok.org.uk wrote:.
> 
> 
> Today's Topics:
> 
>   1. Vulnerability in Zombie Processes (???????? ??????????)
>   2. Metadata exfiltration (Adam Behnke)
>   3. Re: Metadata exfiltration (???????? ??????????)
>   4. Re: Vulnerability in Zombie Processes (Charles Morris)
>   5. [SECURITY] [DSA 2493-1] asterisk security update (Florian Weimer)
>   6. ZDI-12-093 : (Pwn2Own) Microsoft Internet Explorer Fixed
>      Table Colspan Remote Code Execution Vulnerability (ZDI Disclosures)
>   7. [CAL-2012-0026] Microsfot IE Same ID Property Remote Code
>      Execution Vulnerability (Code Audit Labs)
>   8. [CAL-2012-0023]Microsoft IE Developer Toolbar Remote Code
>      Execution Vulnerability (Code Audit Labs)
> 
> 
> ----------------------------------------------------------------------
> 
> 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists