lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <000801c671fa$afbefd50$0100a8c0@TRINITY>
Date: Sun May  7 18:21:39 2006
From: c0redump at ackers.org.uk (c0redump@...ers.org.uk)
Subject: IE7 Zero Day

Come cut my lawn.

On 5/5/06, 0x80@...h.ai <0x80@...h.ai> wrote:
> Yes, this is a beta product but I have reason to believe that this
> issue will not be discovered of fixed by M$ before it goes to gold.
> Why do I believe this?  Because the issue is found in IE 6 but
> doesnt seem to exploit.  Not saying it is not exploitable I am
> saying that I cant make it exploit.
>
> I work as a pizza delivery driver at night and work part time
> landscaping in my days.  So I feel it is only fair that I be
> compensated for this vulnerability.
>
> Highest bidder that can convince me that you will actually pay
> wins.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ