[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1101855431.2318.17.camel@fedora.l33tsecurity.com>
Date: Tue, 30 Nov 2004 17:57:11 -0500
From: John <JohnH@...netops.com>
To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com
Subject: RE: Remote Mercury32 Imap exploit
The only point I see is, If you are going to do something you might as
well do it correctly or not do it at all. If you get popular in the
doing so, then so be it.
John
On Tue, 2004-11-30 at 14:06, muts wrote:
> Re Johnh,
>
> If I'm not mistaken, the point isn't to get a *working exploit* out to the
> public, but more of a proof of concept to point out a vulnerability.
> The only reason to release a *fully* working exploit out to the wild would
> be to get popular amongst the script kiddies. Well done, you're popular now
> :)
>
> Muts
>
>
> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of JohnH
> Sent: Tuesday, November 30, 2004 7:38 AM
> To: full-disclosure@...ts.netsys.com
> Cc: bugtraq@...urityfocus.com
> Subject: [Full-Disclosure] Remote Mercury32 Imap exploit
>
> Here you go guys. A fully working Remote Mercury32 Imap exploit. This will
> work on any windows OS. 100% universal.
>
> Only reason I am posting this is because im sick of seeing non working
> exploits released and WHITEHAT.CO.IL likes to do this.
>
> Cheers,
>
>
> Johnh@...netops.com
> VIST: www.secnetops.com
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists