lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20060520144612.28727.qmail@paddy.troja.mff.cuni.cz>
Date: Sat May 20 16:25:04 2006
From: peak at argo.troja.mff.cuni.cz (Pavel Kankovsky)
Subject: Re: iDefense Q2 2006 Vulnerability Challenge

On Wed, 17 May 2006, labs-no-reply@...fense.com wrote:

> For the second quarter of 2006, we're shifting the focus from vendor to
> technology. This time around, we're focusing on database
> vulnerabilities. [...]

> - The vulnerability must result in root access on the target machine

"Root access on the target machine"? Are you serious?
Isn't "DBA access on the target database engine" enough for you?

--Pavel Kankovsky aka Peak  [ Boycott Microsoft--http://www.vcnet.com/bms ]
"Resistance is futile. Open your source code and prepare for assimilation."

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ