| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <86144ED6CE5B004DA23E1EAC0B569B5801F7777E@isabella.herefordshire.gov.uk> From: prandal at herefordshire.gov.uk (Randal, Phil) Subject: RE: Remote Mercury32 Imap exploit The patched version of Mercury32 can be found here: ftp://ftp.usm.maine.edu/pegasus/mercury32/m32-401b.zip Cheers, Phil ---- Phil Randal Network Engineer Herefordshire Council Hereford, UK > -----Original Message----- > From: JohnH [mailto:johnh@...netops.com] > Sent: 01 December 2004 23:29 > To: full-disclosure@...ts.netsys.com > Cc: bugtraq@...urityfocus.com > Subject: Remote Mercury32 Imap exploit > > Here you go guys. A fully working Remote Mercury32 Imap > exploit. This will work on any windows OS. 100% universal. > And now it has 14 possible targets. > > Again, Someone posted some dos code :( > > > Cheers, > > > Johnh@...netops.com > Security Researcher > VISIT: www.secnetops.com >
Powered by blists - more mailing lists