lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat Jun 24 19:14:58 2006 From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu) Subject: Amazon, MSN vulns and.. Yes, we know! Mostsites have vulnerabilities On Sat, 24 Jun 2006 13:45:47 EDT, Jason said: > You have a lot of nerve! It was not too long ago that I recall you being > the clueless one on the FD list. Aye.. that he was, as we all were at one time (myself included, even if that phase *did* predate the creation of FD by more than 2 decades). However, Morning has had enough sense to pay attention and acquire at least some clue... Having said that, I'll posit that Morning is right - Milw0rm is a site well known enough that *by definition* an exploit showing up there moves it from '0-day' to 'just another damned unpatched vuln'. After all, 0-day means "an unknown exploit you can't defend against because you've never seen it". Which is hardly the case for any Milw0rm exploit. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 226 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060624/83eed26b/attachment.bin
Powered by blists - more mailing lists