Full Disclosure mailing list archives
Re: Internet Explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)
From: <ctor () hushmail com>
Date: Mon, 7 Jun 2004 21:53:01 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 || From: http-equiv <1 () malware com> || You and your friend provide nothing. Never have. || Never will. You and he ought remain in the peanut || gallery and let doer's do. Sit back keep your || mouth shut and learn from people who do. provide what to who? all you are doing yourself is providing exploits that any 12 year old kiddie can use and making html pages that help phishers defraud innocent people. do what? all you are doing is helping the bad guys and increasing my insecurity. you are like a burglar complaining about the handcuff company helping out cops. || You should be on your knees thanking Jelmer for || explaining it, no one else can and no one else || has. Because its not so easy. what are you talking about? the only reason jelner is even looking at these vulnerabilities are because rafel ivgi posted about them on NtBugtraQ and even said they were affecting patched users. - --> 180 Solutions Exploits and Toolbars Hacking Patched Users(I.E Exploits) <-- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0406&L=ntbugtraq&F=P&S=&P=844 why cant you just step forward and show your true colors? you are not trying to be security researchers, you are just having fun finding vulnerabilities and pissing on everybody else. no shame in that, just admit it. its fun to exploit people and kick microsoft in the crotch but it has nothing to do with helping anyone. ||ctor -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkDGmSAACgkQIfxDSqSK35zk4ACgu6yvxUvcOk2mgp1rub9jcq80YqwA njGseIEU9DW0H7gdlc7vX5DlGBRT =WGrU -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger https://www.hushmail.com/services.php?subloc=messenger&l=434 Promote security and make money with the Hushmail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- [sb] RE: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan), (continued)
- [sb] RE: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) Larry Seltzer (Jun 07)
- Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) Gadi Evron (Jun 07)
- RE: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) Chris Carlson (Jun 06)
- Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) http-equiv () excite com (Jun 07)
- Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) Gadi Evron (Jun 07)
- Re: Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) http-equiv () excite com (Jun 08)
- Re: Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) Gadi Evron (Jun 08)
- Re: Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) Benjamin Meade (Jun 09)
- Re: Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) Gadi Evron (Jun 09)
- Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) Gadi Evron (Jun 07)