lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030709120621.GA27818@uk.intasys.com>
From: steve at steve.org.uk (Steve Kemp)
Subject: Re: Fwd: xbl vulnerabilty

On Wed, Jul 09, 2003 at 09:12:01AM +0200, martin f krafft wrote:
> 
> If you don't give us a name, we can't credit you. We will not say
> that "mysterious auto94042@...hmail.com found that..."

  Some bugs are credited nicely, for example DSA-327 which was my
 initial XBL report.  (Don't know how I missed the -display option,
 I must have just given up when I saw the other flaw.  My apologies).

  But taking a look at DSA-326 which referred to Orville Write there
 was no direct credit, instead readers had to jump to Debian bug number
 170747 to see my name.

  (I think I've been creditted on four Debian advisories out of five
 now - not bad going :)

Steve
---

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ