lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAAnPYQ7vtQq25ag3wZgaqu-mr1gvDhyfBC4YW0yNRYh6L=3iLA@mail.gmail.com> Date: Sun, 05 Jul 2015 06:30:02 +0000 From: Gynvael Coldwind <gynvael@...dwind.pl> To: Vulnerability Lab <research@...nerability-lab.com>, fulldisclosure@...lists.org Cc: s-dz@...mail.fr Subject: Re: [FD] Google HTTP Live Headers v1.0.6 - Client Side Cross Site Scripting Web Vulnerability Hi, Quick question with regards to your disclosure - why are you attributing the ownership/authorship of HTTP Live Headers to Google? The website you linked seems to clearly says it's developed by eSolutions Nordic AB ("offered by https://www.esolutions.se"). Also, if you found a vulnerability in eSolutions' HTTP Live Headers, why do you include information about "Google's Chrome Web Store" in the "Product & Service Introduction"? And last question - did you notify eSolutions about the bug? Cheers, Gynvael _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists