lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <200604190320.k3J3KALC002790@mailserver2.hushmail.com>
Date: Wed Apr 19 04:20:21 2006
From: 0x80 at hush.ai (0x80@...h.ai)
Subject: Google Groups e-mail disclosure in plain text

So releasing one vulnerability... and not even a remote system 
one... makes them legitimate?  They are just as bad as that n3td3v 
faggot.

On Tue, 18 Apr 2006 17:56:42 -0700 Aaron Gray <angray@...b.net> 
wrote:
>>Kill Secunia, the illegal high jackers of FD.
>
>Yes they release real vulnerablities.
>
>See "Internet_Explorer_Address_Bar_Spoofing_Vulnerability_Test":-
>
>        http://secunia.com/advisories/19521/
>
>Will disabling or removing Flash till its solved prevent this ?
>
>Aaron
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ