lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060507180950.D04E4DA820@mailserver8.hushmail.com>
Date: Sun May  7 19:10:27 2006
From: 0x80 at hush.ai (0x80@...h.ai)
Subject: IE7 Zero Day

Come lick my asshole.

On Sun, 07 May 2006 10:21:30 -0700 c0redump@...ers.org.uk wrote:
>Come cut my lawn.
>
>On 5/5/06, 0x80@...h.ai <0x80@...h.ai> wrote:
>> Yes, this is a beta product but I have reason to believe that 
>this
>> issue will not be discovered of fixed by M$ before it goes to 
>gold.
>> Why do I believe this?  Because the issue is found in IE 6 but
>> doesnt seem to exploit.  Not saying it is not exploitable I am
>> saying that I cant make it exploit.
>>
>> I work as a pizza delivery driver at night and work part time
>> landscaping in my days.  So I feel it is only fair that I be
>> compensated for this vulnerability.
>>
>> Highest bidder that can convince me that you will actually pay
>> wins.
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ