lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Sea1-DAV72vjPkQTGpa00009d46@hotmail.com>
From: roblewis963 at hotmail.com (Rob Lewis)
Subject: ProFTPD-1.2.9rc2 remote root exploit

Ha Funny, I was just thinking the same thing, except I was thinking they are
busy re-installing from scratch hehehe.....



----- Original Message ----- 
From: "Cael Abal" <lists@...you.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Friday, October 24, 2003 1:09 PM
Subject: Re: [Full-Disclosure] ProFTPD-1.2.9rc2 remote root exploit


> > Ladies and gentlemen, here's the source code of the exploit for the
latest
> > release of ProFTPD. This is a Zero-Day private exploit, please DON'T
> > REDISTRIBUTE. I will not take responsibility for any damages which could
> > result from the usage of this exploit, use it at your own risk.
>
> FD got noticably quieter in the last few hours -- I wonder if there are
> a lot of folks out there restoring from tape?
>
> Ha!  Just kidding.  Of course that type doesn't make frequent backups.  :)
>
> C
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ