Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Joey Mengele (joey.mengelehushmail.com)
Date: Wed Jun 27 2007 - 15:38:05 CDT
Due to your extreme uncooperativeness, I will be attempting to
brute force the contents of this advisory in the meantime. Thank
On Wed, 27 Jun 2007 16:29:43 -0400 pagvac
>The file "research.txt" will be provided once the vendor fixes the
>issues. At that point anyone can check that the hash matches the
>included in this post.
>Joey Mengele wrote:
>> Please provide the original content of research.txt so I can
>> that the hash is correct. I will also need the hash of your
>> md5sum.exe. Thanks.
>> On Wed, 27 Jun 2007 16:02:16 -0400 pagvac
>> <unknown.pentestergmail.com> wrote:
>>> The HTTP interface of a network appliance has been researched
>>> found to be vulnerable to several persistent XSS and CSRF.
>>> Such research was done by pdp (architect) and myself. We
>>> vendor and will publish the details when a fix is available.
>>> The following is the MD5 hash for the advisory file.
>>> $ md5sum.exe research.txt
>>> 3db1d71fc3a0eae119617b3b1124206f *research.txt
>>> [http://gnucitizen.org, http://ikwt.com/]
>> Click here for to find products that will help grow your small
Click for a free comparison on healthcare coverage and save 100's
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/