lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200210111743.g9BHhd892978@mailserver1.hushmail.com> From: auto461767 at hushmail.com (auto461767@...hmail.com) Subject: hushmail spam/abuse/mailbombing vulnerability demonstrated by Mr. Gobbles -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hushmail should thank Mr. Gobbles for so ably demonstrating their spam vulnerability. Perhaps he could share his mailbombing code or methodology with the list? /daynil -----BEGIN PGP SIGNATURE----- Version: Hush 2.2 (Java) Note: This signature can be verified at https://www.hushtools.com/verify wl8EARECAB8FAj2nDcoYHGF1dG80NjE3NjdAaHVzaG1haWwuY29tAAoJECAQ2FfyD9oI HC0AoIjX2HpTtyaPFDDOw0zawyLKmbwLAJ4iFaW/j8RwDlwEvx2LhZlMBCJu/A== =81YQ -----END PGP SIGNATURE-----