Re: [Full-disclosure] Erronous post concerning Backtrack 5 R2 0day
- From: Ryan Dewhurst <ryandewhurst@xxxxxxxxx>
- Date: Thu, 12 Apr 2012 22:11:07 +0100
I think it is misleading to just blame it on title shortening when you
clearly stated in the body of the advisory:
"This 0day exploit for Backtrack 5 R2 was discovered by a student in
theInfoSec Institute Ethical Hacking class, during an evening CTF exercise."
This was also said on the original post on your website but has since been
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: [Full-disclosure] [SECURITY] [DSA 2451-1] puppet security update
- Next by Date: Re: [Full-disclosure] Most Linux distributions don't use tmpfs nor encrypt swap by default
- Previous by thread: Re: [Full-disclosure] Erronous post concerning Backtrack 5 R2 0day
- Next by thread: [Full-disclosure] VMSA-2012-0007 VMware hosted products and ESXi/ESX patches address privilege escalation