lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3a166c090604181315la3127f5h64abc3794365d664@mail.gmail.com>
Date: Tue Apr 18 21:15:31 2006
From: n3td3v at gmail.com (n3td3v)
Subject: Google Groups e-mail disclosure in plain text

On 4/18/06, Vidar L?kken <vidarlo@...tdata.no> wrote:
> On Tue, 18 Apr 2006, n3td3v wrote:
> > Problem:
> > Google forgot to add obscurity measures for forwarded messages, and so
> > an e-mail address is readable via web interface headers,  in plain
> > text.
>
> C'mon people, ensure Mr. 1337 N3tD3v gets his viagra ads!
> --
> MVH,
> Vidar
> You are only young once, but you can stay immature indefinitely.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

How many Google vulnerabilities have you found? Even to find css/xss
on Google is few and far between.

So, show me and everyone else how easy it is to disclose a "lame"
Google vulnerability, on-the-fly. (If you can't then you need viagra
ads.)

The b0f's are on my print spool queue already, never underestimate
whats going on behind the scenes.

You aka FD will be contacted in due course...

Regards, n3td3v

Personal:
Kill Secunia, the illegal high jackers of FD.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ