lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.21.0606241515030.19096-100000@linuxbox.org>
Date: Sat Jun 24 23:37:01 2006
From: ge at linuxbox.org (Gadi Evron)
Subject: Amazon, MSN vulns and.. Yes, we know! Most
	sites have vulnerabilities

On Sat, 24 Jun 2006, David Taylor wrote:
> 
> I guess our disconnect on this is my lack of knowledge on how the actual
> exploits get submitted.  I think I just assumed it was the person that
> discovered the vulnerability and/or developed the exploit that submits it to
> places like Milw0rm.
> 


The problem is, they are not the only ones.

> 
> On 6/24/06 9:11 AM, "Gadi Evron" <ge@...uxbox.org> wrote:
> 
> 
> > Once again we are mostly in agreement, but there is one point I do
> > disagree on completely.
> > 
> > How would having the vulnerability being exploited by Bad Guys already,
> > who get it via their sources, while not letting the Good Guys know about
> > and put pressure on the vendor to fix help out?
> > 
> > Like I said earlier, this isn't black and white and some vendors do things
> > right, still, the one thing about Full Disclosure no one can dispute,
> > despite whatever else it may be - it works.
> > 
> > Now how is the exploits being out and just us not knowing about them help
> > us any? The ones who use the for harm will do so regardless.
> > 
> > Gadi.
> > 
> 
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ