lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <C0C2B93D.20C71%ltr@isc.upenn.edu>
Date: Sat Jun 24 14:44:34 2006
From: ltr at isc.upenn.edu (David Taylor)
Subject: Amazon, MSN vulns and.. Yes, we know! Most
	sites have vulnerabilities


I guess our disconnect on this is my lack of knowledge on how the actual
exploits get submitted.  I think I just assumed it was the person that
discovered the vulnerability and/or developed the exploit that submits it to
places like Milw0rm.


On 6/24/06 9:11 AM, "Gadi Evron" <ge@...uxbox.org> wrote:


> Once again we are mostly in agreement, but there is one point I do
> disagree on completely.
> 
> How would having the vulnerability being exploited by Bad Guys already,
> who get it via their sources, while not letting the Good Guys know about
> and put pressure on the vendor to fix help out?
> 
> Like I said earlier, this isn't black and white and some vendors do things
> right, still, the one thing about Full Disclosure no one can dispute,
> despite whatever else it may be - it works.
> 
> Now how is the exploits being out and just us not knowing about them help
> us any? The ones who use the for harm will do so regardless.
> 
> Gadi.
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ