Bugtraq mailing list archives
Protocol
From: aleph1 () dfw net (Aleph One)
Date: Tue, 24 Mar 1998 21:26:39 -0600
I approved Mike Gleason's message to remind everyone that if possible you should contact the vendor of vulnerable software when you discover a vulnerability. This is not meant to imply that you should not inform BugTraq at the same time or soon after. But after all the purpose of the list is to try to improve everyones security. To that end you should use whatever means you have. I do not want this thread to become another full disclosure debate so it ends here. Take it a small reminder of why we are all here. Aleph One / aleph1 () dfw net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01
Current thread:
- Re: apache+ssl 1.13 symlink problem Ben Laurie (Mar 24)
- Re: apache+ssl 1.13 symlink problem; NcFTP 2.4.2+ Mike Gleason (Mar 24)
- Clarification Mike Gleason (Mar 24)
- Protocol Aleph One (Mar 24)
- SECURITY: new svgalib and kbd now available Erik Troan (Mar 25)
- Sumbit Internet Account v1.1 Dax Kelson (Mar 25)
- Majordomo /tmp exploit Karl G - NOC Admin (Mar 26)
- FW: mysql: Trivial mSQL/MySQL DoS method? (fwd) Michael Widenius (Mar 26)
- Re: Majordomo /tmp exploit Steven Pritchard (Mar 26)
- easy DoS in most RPC apps Peter van Dijk (Mar 28)
- Netscape passes mailbox path and message ID as refferer Rop Gonggrijp (Mar 28)
- Hole. HKirk (Mar 28)
- Rhino9: WinGate Vulnerability Aleph One (Mar 29)
- MySQL Security Sandu Mihai (Mar 29)
- Majordomo /tmp exploit Karl G - NOC Admin (Mar 26)
(Thread continues...)