lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070119060550.B987722846@mailserver9.hushmail.com>
Date: Fri, 19 Jan 2007 01:05:49 -0500
From: <auto178855@...hmail.com>
To: <full-disclosure@...ts.grok.org.uk>
Cc: 
Subject: Re: iDefense Q-1 2007 Challenge -I WILL BUY FOR
	MORE

SAME TARGETS: ie7 VISTA 8k, I know someone who will pay much for up 
to 75 for the same. YOUR WORDS FUCKFACE

ST00PID LYING CUNT!

"I can arrange the legitimate purchase of most 
working exploits for significantly more money than iDefense, In 
some cases 
over $75,000.00 per purchase."

"""""""""" 
Re: [Full-disclosure] iDefense Q-1 2007 Challenge

From: Simon Smith (simonsnosoft.com)
Date: Tue Jan 16 2007 - 11:14:56 CST 
know someone who will pay significantly more per vulnerability 
against the 
same targets. 



On 1/10/07 12:27 PM, "contributor" <Contributoridefense.com> wrote: 



> -----BEGIN PGP SIGNED MESSAGE----- 
Hash: SHA1 
  
Also available at: 



> 
http://labs.idefense.com/vcp/challenge.php#more_q1+2007%3A+vulnerabi
lity+chall 
> enge 


*Challenge Focus: Remote Arbitrary Code Execution Vulnerabilities 
> in 
Vista & IE 7.0* 

"

On Fri, 19 Jan 2007 00:43:50 -0500 Simon Smith <simon@...soft.com> 
wrote:
>Nobody ever said that 75,000.00 was a price for a remote vista 
>bug.
>
>
>On 1/18/07 8:39 PM, "auto178855@...hmail.com" 
><auto178855@...hmail.com>
>wrote:
>
>> This is complete bullshit nothing more than a social engineering
>> honey pot to get bugs and vulns for their own use, this company
>> couldn't affort 75.ooo USD if they tried, they cannot even find
>> their own bugs, they got 4 or 5 shitty "reasearch and vuln"
>> findings of thier own, that's it.
>> 
>> 75.000 for a remote vista ie7 xploit, guaranteed you wont find 
>it
>> and if you do they won't pay
>> 
>> lose lose :(
>> 
>> jigga
>> 
>> yo
>> 
>> 
>> 
>> 
>> 
>> 
>> Concerned about your privacy? Instantly send FREE secure email, 
>no account
>> required
>> http://www.hushmail.com/send?l=480
>> 
>> Get the best prices on SSL certificates from Hushmail
>> https://www.hushssl.com?l=485
>> 
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ