lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20030717042055.GT4584@netsys.com>
From: len at netsys.com (Len Rose)
Subject: Cisco Code Train matrix (mystery IOS vulnerability)

Hi.. merely reporting what information we had available,
and as far as I know it was the ONLY source of information
at the time. Perhaps Cisco could post something sooner next
time.

Len

On Thu, Jul 17, 2003 at 12:18:29AM -0400, Jim Duncan wrote:

[snipped]

> Please don't do that.  The best thing is to read the official copy of 
> the advisory at http://www.cisco.com/go/psirt
> 
> The copy you cite is pirated and might not be correct.  It certainly 
> won't be updated automatically.  Anyone relying on it might not get the 
> best information.
> 
> Disclaimer: I am no longer a member of the PSIRT team, but I am well 
> aware of the impact from out-of-date cached copies of advisories.
> 
> Thanks.
> 
> 	Jim
>

[snipped]
 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ