lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: jeremiah at nur.net (Jeremiah Cornelius) Subject: SSH Exploit Request -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday 13 November 2003 01:09, Florian Weimer wrote: > Jack Chum wrote: > > > > Though it's late to ask, but could anyone send me the last openssh > > exploit for our lab-test? > > > The last exploit for a critical vulnerability in OpenSSH is from 2001. > You might be helpful - in some /small/ way: Google for "gobbles" and "ssh".... Bingo! > > We need to test it before we are permitted to upgrade. Please help. > > > Help yourself and redesign your patch management. Yeah. Everyone can do that, smartass. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/s1qRJi2cv3XsiSARAmQnAJoChIj/tcvoOELhkDg00pXTnruP4wCePkIx 6TtvnOE+NnFFShhnHFJVLo8= =di6f -----END PGP SIGNATURE-----
Powered by blists - more mailing lists