lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <001301c526ba$8060fea0$4912010a@kings.edu> From: MailMonitor at kings.edu (MailMonitor@...gs.edu) Subject: MailMonitor for Exchange has processed a suspicious mail A mail addressed to you has been identified as suspicious by MailMonitor for Exchange. Event: infection Action: No action Message ID: <96BCCB62FB25F746A54214CBA0FB94A801F3A794@...-ny-exc1.net.sybari.com> Message subject: [QUAR]RE: [Full-disclosure] Re: Multiple AV Vendor Incorrect CRC32BypassVulnerability. Sender: "Steve Scholz" <steve_scholz@...ari.com> ============================================================= Attachment information: Event: encrypted Action: No action Filename: crc changed.zip Virus: =============================================================