lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <418483AC.7050706@cs.hmc.edu> From: jruderma at cs.hmc.edu (Jesse Ruderman) Subject: Slashdot: Gmail Accounts Vulnerable to XSS Exploit n3td3v wrote: >Should the general public be expecting a disclosure of the >vulnerability to security mailing lists once a solution has been >implemented to patch the hole, so other web-based services are aware >of the possibility of the same problem being an issue for them, or >should gmail be keeping everything secret after they patch. > I'd be surprised if the vulnerability wasn't something already mentioned on http://www.squarefree.com/securitytips/web-developers.html#XSS .