[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] YES!!!



Dan,
Dont be so impressed... This was sent using an automated script.

On Wed, Jan 14, 2009 at 7:26 PM, Daniel H. Renner <
dan@xxxxxxxxxxxxxxxxxxxxxxxxxx> wrote:

> I finally made it to the penultimate level of "Important enough to be
> spoofed"!!!!
>
> Woo-hoo!!
>
> Note to spoofer:
> ----------------
> Please learn how to send email first...I need to claim my notoriety!
> --
>
>
> Sincerely,
>
> Daniel H. Renner
> President
> Los Angeles Computerhelp
> A division of Computerhelp, Inc.
> 818-352-8700
> http://losangelescomputerhelp.com
>
> "Inactivity is death" - Benito Mussolini
> (Even evil dictators know the truth...)
>
>
>
> -------- Original Message --------
> Subject: Delivery Status Notification (Failure)
> Date: Wed, 14 Jan 2009 18:32:14 퍝�
> From: postmaster@LARSEN
> To: dan@xxxxxxxxxxxxxxxxxxxxxxxxxx
>
> This is an automatically generated Delivery Status Notification.
>
> Unable to deliver message to the following recipients, due to being unable
> to connect successfully to the destination mail server.
>
>      full-disclosure@xxxxxxxxxxxxxxxxx
>
>
>
> -----
>
> Reporting-MTA: dns;LARSEN
> Received-From-MTA: dns;LARSEN
> Arrival-Date: Fri, 7 Nov 2008 21:01:15 퍝�
>
> Final-Recipient: 
> rfc822;full-disclosure@xxxxxxxxxxxxxxxxx<rfc822%3Bfull-disclosure@xxxxxxxxxxxxxxxxx>
> Action: failed
> Status: 4.4.7
>
>
>
> Subject:
> Blackboard Learning and Community Portal Systems 5
> From: "Daniel H. Renner" <dan@xxxxxxxxxxxxxxxxxxxxxxxxxx>
> Date: 7 Nov 2008 20:59:54 퍝�
> To: full-disclosure@xxxxxxxxxxxxxxxxx
>
> Advisory 2008-6-12 Local Privilege Escalation Vulnerabilities in Blackboard
> Learning and Community Portal Systems 5
>
> I. BACKGROUND
>
> Advisory marked for immediate release.
>
> II. DESCRIPTION
>
> Yo nigga plz!!! Gimme dat cornbread and pass the fried chicken
>
> III. HISTORY
>
> This advisory has no history.
>
> IV. WORKAROUND
>
> There are no known workarounds.
>
> V. VENDOR RESPONSE
>
> None.
>
> VI. CVE INFORMATION
>
> The Common Vulnerabilities and Exposures (CVE) project has assigned the
> name CVE-2008-3942 to this issue.
>
> CONTACT:
> *Daniel H. Renner dan@xxxxxxxxxxxxxxxxxxxxxxxxxx
>
> *1-555-LOL-COCKDONGS
>
> *CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS BACON LULZ
>
>
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/