lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: gator at mail.cacr.caltech.edu (Anne Carasik) Subject: Win-Trap captured DCOM-RPC exploit code, on the spot! I don't think you have too much to worry about anymore. >From http://www.phsecurity.com, their account appears to be suspended. -Anne Knud Erik H?jgaard grabbed a keyboard and typed... > Executable Security wrote: > [snip disgusting commercial] > > Why dont you people fuck off and die die die? Spamming the list is one > thing, which should be punished, but spamming my private inbox is worse. > It seems www.phsecurity.com runs some old version of openssl, any takers? > > info@...ecurity.com spam spam info@...ecurity.com spam spam, off to usenet > we go. > > -- > kokanin, sick of spamming assholes. > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html -- .-"".__."``". Anne Carasik, System Administrator .-.--. _...' (/) (/) ``' gator at cacr dot caltech dot edu (O/ O) \-' ` -="""=. ', Center for Advanced Computing Research ~`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030728/6bf564a4/attachment.bin
Powered by blists - more mailing lists