[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: PROPOSAL: Cluster 20 - DESIGN (27 candidates)

Okay, then if you want to list anything that *might* be considered a 
vulnerability, I want to see an entry for each version of Windows. 
Running it is a vulnerability that can lead to compromise.

Then, one entry for each version of Unix, and one for each version of Linux.

Then, one for each WWW browser capable of running applets or doing 
downloads, and one for every MIME-capable mailer.

If you are going to be kitchen sink repository, let's go right to the 
source of the plumbing problems, so to speak.


Page Last Updated or Reviewed: May 22, 2007