lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1080090266.24153.51.camel@Stargate> From: nodialtone at comcast.net (Byron Copeland) Subject: Re: Advisory 03/2004: Multiple (13) Ethereal remote overflows On Tue, 2004-03-23 at 19:20, Tobias Weisserth wrote: > Hi Byron, > > Am Di, den 23.03.2004 schrieb Byron Sonne um 23:14: > > > Proof of Concept: > > > e-matters is not going to release an exploit for any of these > > > vulnerabilities to the public. > > > > So why should we believe you then? > > Nobody is forcing you to believe him. You may as well prove him wrong by > showing us that his findings are wrong. And if you want exploits, the > word about specific weak points is out. Write your own. > > Another question: why shouldn't we believe Stefan? Because he doesn't > offer working exploits with things he discloses to this list? Please. > This is ridiculous. > Nothing against you Tobias, aber ich habe das was oben geshreibt ist, nicht geschieben. :) Danke, -byron -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040323/229fe837/attachment.bin
Powered by blists - more mailing lists