lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040422203213.44641.qmail@web11407.mail.yahoo.com> From: xillwillx at yahoo.com (Will Image) Subject: THCIISSLame exploit tamas you hungry? eat a dick. --- Feher Tamas <etomcat@...email.hu> wrote: > Hello, > > >just wanna point out a small release. > >it's a remote root for the latest IIS 5 SSL pct > bug. > >enjoy, johnny cyberpunk/thc > > A., Kaspersky AV added detection within two hours, > so it is probably > considered dangerous. > > B., Because you provided a ready-made executable > version of the root > exloit for download, you are a VXer criminal. > Microsoft has already > asked the germans to send in GSG-9. When the > doorchime rings, first > place your finger over the peeking hole. If it is > not shot away > immediately, you may open the door. > > Owing to the new extradiction treaty between Germany > and Saudi > Arabia, VXers are subject to cruel and harsh > punishment. You can > choose severing the left or the right arm. > Recidivists will obviously need > a voice-controlled computer pretty soon. > > Regards, Tamas Feher. > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html __________________________________ Do you Yahoo!? Yahoo! Photos: High-quality 4x6 digital prints for 25¢ http://photos.yahoo.com/ph/print_splash
Powered by blists - more mailing lists