lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <PLEIIGNDLGEDDKABPLHBMECBDAAA.dparis@w3works.com>
Date: Wed, 31 Mar 2004 12:40:57 -0500
From: "Dave Paris" <dparis@...orks.com>
To: "Shaun Colley" <shaunige@...oo.co.uk>,
	<bugtraq@...urityfocus.com>
Subject: RE: cdp buffer overflow vulnerability


I would respectfully recommend submitting a more descriptive subject line
next time.  I saw "cdp" and the first thing that came to mind was "Cisco
Discovery Protocol".

Kind Regards,
-dsp

> -----Original Message-----
> From: Shaun Colley [mailto:shaunige@...oo.co.uk]
> Sent: Wednesday, March 31, 2004 11:16 AM
> To: bugtraq@...urityfocus.com
> Subject: cdp buffer overflow vulnerability
>
>
> ~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*
>
> Product:      cdp - console cd player
[...]




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ