|
Message-ID: <CAPGxrc_kUAFA6Y_QnSxx-iyt2kGoKG1=RCSKUGE=ot1qvTtL=w@mail.gmail.com> Date: Sat, 29 Apr 2017 10:43:50 +0800 From: redrain root <rootredrain@...il.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2017-8291 ghostscript remote code execution what a awkward?? I have discovered a part of my vulns about ghostscript last year and exploited in fulldisclosure early! and these vulns are part of mine I was going to discovered these in defcon or other conference...WTF... u guys are logo designer??? there are two demos last year Evince Arbitrary Code Execution https://youtu.be/wzcrHXngfcM Attack Imagick through Ghostscript https://youtu.be/tPGm_ANDyOw Regards, redrain 2017-04-28 19:37 GMT+08:00 David Black <dblack@...assian.com>: > On Friday, 28 April 2017, Kurt H Maier <khm@...ops.net> wrote: > > > On Fri, Apr 28, 2017 at 01:50:04AM -0000, security@...assian.com > > <javascript:;> wrote: > > > > > > Why are you sending user-tracking urls to this list? > > > > > Hi Kurt, > We did not intend to send user tracking urls to this list. However, the > method we used to send the email resulted in sendgrid rewriting the the > links. We apologise regardless. > > > -- > David. > > > -- > David Black / Security Engineer. >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.