lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061119114627.883.qmail@securityfocus.com>
Date: 19 Nov 2006 11:46:27 -0000
From: info@...italarmaments.com
To: bugtraq@...urityfocus.com
Subject: Digital Armaments November-Decemberr Hacking Challenge: KERNEL

Challenge pubblication is 11.02.2006

http://www.digitalarmaments.com/challenge200611849937.html

I. Details

Digital Armaments officially announce the launch of November-December hacking challenge.

The challenge starts on November 1. For the November-December Challenge, Digital Armaments will give 5000 credits EXTRA for each KERNEL vulnerability submission that results in a remote code execution vulnerability. It is valid for any OS Kernel.

The submission must be sent during the November/December months and be received by midnight EST on December 31, 2006. The 5000 credits prizes will be given on the publication of a official advisory regarding the vulnerability. The 5000 credits will be an extra added to the normal vulnerability payment (check the DACP scheme).

II. References

For further information on Digital Armaments Contributor Program (DACP) please refer at:

http://www.digitalarmaments.com/contribute.html

Details of credits value can be found at:

http://www.digitalarmaments.com/contribute.html#credit

III. Legal Notices

Copyright © 2006 Digital Armaments Inc.

Redistribution of this alert electronically is allowed. It should not be edited in any way. Reprint the whole is allowed, partial reprint is not permitted. For any other request please email customerservice (at) digitalarmaments (dot) com [email concealed] for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ