Vulnerability Development mailing list archives

RE: Re: Vulnerability Buyer Company


From: "Evans, Arian" <Arian.Evans () fishnetsecurity com>
Date: Mon, 31 Oct 2005 16:42:11 -0600

If one parses the text of the Digital Armaments website
with the various texts of the yahoo email sender, there
are some very obvious spelling and syntax similarities. ;)

Nice try though; normally I can tell which widget vendor
is socially-engineering the various lists from webmail
accounts by the unmitigated praise and technobafflegab
lifted right off the vendor's marketing bullet points.

Oh wait...

-ae

-----Original Message-----
From: dave_endler () 3Com com [mailto:dave_endler () 3Com com] 
Sent: Monday, October 31, 2005 12:13 PM
To: mpycube () yahoo com
Cc: vuln-dev () securityfocus com
Subject: Re: Re: Vulnerability Buyer Company


Hi there,

With regards to the Zero Day Initiative, every monetary offer 
we have made
so far has been accepted.  It's also interesting that we have 
no record of
you in our researcher list. Either this is poorly disguised 
digitalarmaments
self-plug or you need to check our PGP key to ensure you are 
talking to
right Zero Day Initiative 
(http://www.zerodayinitiative.com/contact.html).
Thanks,

-dave

David Endler
Director of Security Research
TippingPoint, a division of 3Com

-----Original Message-----
From: mpycube () yahoo com [mailto:mpycube () yahoo com] 
Sent: Sun Oct 30 2005 - 16:29:27 CST
To: vuln-dev
Subject: Re: Re: Vulnerability Buyer Company


thanks for the answers.
at the end i sent the vulnerability
both to
- www.zerodayinitiative.com
- www.digitalarmaments.com

and the offer of the second one was much higher.
so i decided to work with them. paymenth fast and as 
concorded and i also
got some credit to get in future some stock's option.

does anyone has already got stocks from digitalarmanets?

thx guys 






Current thread: