lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040704214014.11760.qmail@web53205.mail.yahoo.com>
From: system_outage at yahoo.com (System Outage)
Subject: Gmail Information Disclosure Vulnerability

Gmail service is in Beta. You have no credibility posting this advisory. The correct channel to post such "bugs" is the Gmail contact link for "bug reports". 
 
If you weren't a script kiddie or scene whore, you would have known to hold information until such a time that Gmail became a public service.
 
Then and only then would anyone take this advisory seriously!
 
You obviously have no understanding of the "Beta" state of a development. The fact that a team of developers are in the state of "Beta" means that the developers are fully aware the service may not be entirely secure and they wish feedback via Google's own beta "bug report" channels.
 
All in all, this is  a "beta bug report" and nothing else. If you had waited until the Gmail dev team declared gmail a public release, you would have gained more respect in the security community scene.
 
Cheerio
 
 

		
---------------------------------
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040704/cbd1089f/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ