lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <a07000c1ebdbea0c004b0@[192.168.1.102]> Date: Mon, 15 Nov 2004 10:10:17 -0800 From: Steve Dorner <sdorner@...lcomm.com> To: psz@...hs.usyd.edu.au (Paul Szabo) Cc: NTBugtraq@...tserv.ntbugtraq.com, beckley@...lcomm.com, bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com Subject: Re: Eudora 6.2 attachment spoof At 5:23 AM +1100 11/14/04, Paul Szabo wrote: >Some cases remain un-fixed, as Eudora developers know and admit privately. We knew nothing of the kind, nor did we admit anything of the kind. You simply decided you wanted to interpret what I said to you that way. Your issue is obscure and difficult to exploit in numerous ways. We will fix it, but we do not consider it urgent. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists