lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040716161617.64155.qmail@web52703.mail.yahoo.com> From: elvi52001 at yahoo.com (ElviS .de) Subject: MS04-020 Exploit - Windows NT/2000 POSIX Subsystem Privilege Escalation another MS exploit :-) Windows NT/2000 POSIX Subsystem Privilege Escalation Exploit (MS04-020) http://www.k-otik.com/exploits/07162004.MS04-020posixexp.c.php ElviS --------------------------------- Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040716/244b903d/attachment.html