If you are pointing to an exploit, you should be able to replicate the exploit 
and maybe even go further to give what function resulted in this exploit (not 
checking types, not sanitizing input, etc.) There should also be a description 
on what the exploit leads to (Remote Code Execution, Denial of Service, etc)
________________________________
From: Csgo_servers <[email protected]> on behalf of 
thedudeguy1 <[email protected]>
Sent: Tuesday, October 10, 2017 10:38 AM
To: [email protected]
Subject: Re: [Csgo_servers] Custom files exploit

Stealth Mode. Please post some sort of demonstration or steps to demonstrate
this vulnerability. Just one example is all you need to convince us.



--
Sent from: http://csgo-servers.1073505.n5.nabble.com/

_______________________________________________
Csgo_servers mailing list
[email protected]
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
_______________________________________________
Csgo_servers mailing list
[email protected]
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Reply via email to