|
Message-ID: <CABYiri9LeOtZY+F6UJrYDWqWVNHFeN5Cxdci3eMbuqFT7jcezg@mail.gmail.com> Date: Tue, 6 May 2014 01:08:49 +0400 From: Andrey Korolyov <andrey@...l.ru> To: oss-security@...ts.openwall.com Subject: Re: *Possible* ssh vulnerability They could dive in money like Scrooge McDuck if it real. Pure scam, and reappearing for third(?) time. 236kb of exploit source, must be written for enterprise. On Mon, May 5, 2014 at 9:40 PM, RbN <r.b.n@...eup.net> wrote: > Looks like a fake, but I prefer to post it here anyway: > http://pastebin.com/gjkivAf3 > > If anybody gets more info about it, please share ;) > > > -- > RbN > Archlinux CVE monitoring team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.