lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <43A6B2E4.3000904@heapoverflow.com>
Date: Mon Dec 19 13:17:54 2005
From: ad at heapoverflow.com (ad@...poverflow.com)
Subject: 2x 0day Microsoft Windows Excel

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I have said so this is only null pointer bugs but the way I trigger the
bug might be modded for a remote code execution who know , I'm not a
guru and maybe did an error triggering the flaw who knows :) but I bet
many are already reasearching on this hehe, happy job!

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
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=c16L
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ