lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e5312d6a04070514592f263c6@mail.gmail.com>
From: divzero at gmail.com (Rudolf Polzer)
Subject: ANOTHER 3L33T3 ADVISO AND NOT ON PHP-CASTOR 10.3 BETA (used by 3 peoples on internet) !!! 0DAY EXPLOIT !

On Mon, 5 Jul 2004 21:20:24 +0200 (CEST), frogman@...log.org
<frogman@...log.org> wrote:
> the system() function. This is a very VERY 3v1l backdoor, that allows

I didn't expect that you will actually write that since today is
nowhere April 1th.

If you now find a DoS in a Brainf*** interpreter by coding an endless
loop in Brainf*** you are the first one on my gmail killfile - until
Mar 31th, 2005. Finding the code for an endless loop in Brainf*** will
be your own problem.

Hoping to read REAL advisories again soon

Rudolf Polzer


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ