lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <449D7A4B.3040508@brvenik.com>
Date: Sat Jun 24 18:46:05 2006
From: security at brvenik.com (Jason)
Subject: Amazon, MSN vulns and.. Yes, we know! Mostsites
	have vulnerabilities



Morning Wood wrote:
>>> >> What I am worried about for the moment is milw0rm. That site
>>> releases >> an
>>> >> average of 6 or 7 zero day exploits a day.  It has increased the
>>> >> workload I
>>> >> have letting our IT folks know about new threats. A lot of these
>>> >> vulnerabilities are web/php based but pwn3d is pwn3d.
> 
> if you had a clue you would realize that the majority ( my guess is 98%
> ) of the
> exploits on Millw0rm are not "0day", but are in fact released after
> vendor patches
> are available. ( mabey str0ke could help with his guess on the percentage )
> 

You have a lot of nerve! It was not too long ago that I recall you being
the clueless one on the FD list. There was not much difference between
you then and the current n3td3v persona. It would serve you well to
remember your past and your experiences. There is nothing about you that
is special or unique that you should feel empowered to lead you response
with "if you had a clue"

It is clear to me that you still have not grown up.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ