[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAASf9d_8VSF01Zt1uRrMgTeGm-K+4mKDAp6GC_3CCOiLiwXQg@mail.gmail.com>
Date: Sat, 8 Dec 2012 02:09:04 +0530
From: Rajesh Malepati <chittoor@...il.com>
To: noloader@...il.com, full-disclosure@...ts.grok.org.uk
Subject: Re: MySQL 5.1/5.5 WiNDOWS REMOTE R00T
(mysqljackpot)
On Thu, Dec 6, 2012 at 7:08 AM, Jeffrey Walton <noloader@...il.com> wrote:
> On Mon, Dec 3, 2012 at 11:03 AM, king cope
> <isowarez.isowarez.isowarez@...glemail.com> wrote:
> > Yes I agree, we should discard this default remote vulnerability
> > because it is documented.
> Devil's advocate: Does a questionable design choice/feature that is
> documented make it any less vulnerable?
Looks like someone's sarcasm detector is broken.
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists