lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: xbud at g0thead.com (Orlando) Subject: iDEFENSE Security Advisory 10.02.2002: Net-SNMP DoS Vulnerability My only question to these so called iDefense advisories is. How the fuck do they qualifty as iDefense advisories when 'iDefense researchers' aren't finding these vulnerabilities? I would ask if iDefense researchers have any skill whatsoever or do they rely solely on the research they purchase from the shameless monkies selling their advisories, but I'm sure we all know the answer. ( no offense to the shameless monkies ) heh ;) So to make a security company and call employees security 'professionals' all we have to do is affford to buy other people's work and sell it to companies who are in need of security? hrm... What next blackmailing researchers? Paying smaller software companies to write vulnerable software and let you disclose the vulnerabilities ? On Wednesday 02 October 2002 02:14 pm, David Endler wrote: > iDEFENSE Security Advisory 10.02.2002: Net-SNMP DoS Vulnerability > 20:00 GMT, October 2, 2002 -- ------------------------------ Orlando Padilla http://www.g0thead.com/xbud.asc 'A woman drove me to drink and I didn't even have the courtesy to thank her' -wa ------------------------------
Powered by blists - more mailing lists