lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <AANLkTin_JEj9n=sX8DfWcezvOedO2khXJrESEPqG0mi=@mail.gmail.com>
Date: Fri, 26 Nov 2010 11:30:20 +0100
From: exploit dev <extraexploit@...il.com>
To: Full-Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: cve-2010-4091 exploited via womens-puzzle.com ?
Hi there,
Sorry for annoying all you with this issue. But I believe that is a very
strange (and a bit funny) issue. For example... did cve-2010-4091 really
exploited with a PDF hosted on womens-puzzle.com ?
If you are interested check:
http://extraexploit.blogspot.com/2010/11/cve-2010-4091-exploited-01.html
Feedback are welcome
--
http://extraexploit.blogspot.com
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/