lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: kf_lists at digitalmunition.com (KF (lists)) Subject: Asshat coders I think he has sand in his vagina. -KF VeNoMouS wrote: > We got this email @ milw0rm today, htf can some one bitch this much > for posting their exploit???? I think its kinda retarded that they > release it but it MUST come from only there website, GOT M$ tactics?? > > -----Original Message----- > From: sd luser <sd@...ksheep.org <mailto:sd@...ksheep.org>> > Date: Wed, 23 Mar 2005 19:45:44 +0100 > Subject: krad.c - unpermitted distribution > To: exploits@...tik.com <mailto:exploits@...tik.com>, > vuldb@...urityfocus.com <mailto:vuldb@...urityfocus.com>, > submit@...w0rm.com <mailto:submit@...w0rm.com> > > > hello there, > > it appears that somebody just removed this line from the original exploit: > > * ## PLACING ON ANY PUBLIC URL EXCEPT http://hysteria.cz/~sd/codez > <http://hysteria.cz/%7Esd/codez> PROHIBITED > > and posted it, the others just copied it as the code seemed to be free > to distribute. > > http://hysteria.cz/~sd/warez/krad.c > <http://hysteria.cz/%7Esd/warez/krad.c> > > this is the original url, i would like to see you use that link or not > disclose the code > at all. as well as my rights, there is also indentation fucked up :) > > have a nice day > >------------------------------------------------------------------------ > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.grok.org.uk/full-disclosure-charter.html >Hosted and sponsored by Secunia - http://secunia.com/ >
Powered by blists - more mailing lists