Hi Paul, The mere mention of fcgi-bin/echo in your first mail is enough for anybody to derive the PoC. Here's what I found in under a minute: /fcgi-bin/echo/<script>aler('xss')</script> Anybody with a days work in Web Application security would be able to figure this out knowing the vulnerable script. Just my two cents. Regards, Riyaz Walikar On 10/14/10, paul.szabo@xxxxxxxxxxxxx <paul.szabo@xxxxxxxxxxxxx> wrote: > Dear Thor, > > Amazing how people claim being logical ... sure sign they aren't! > >> ... Irrespective of the method you choose to validate "bona-fide" >> recipients of your PoC, you will have no control over what the >> recipient chooses to do with it once they have it. As such, logic >> dictates that your PoC be considered "public" the moment you release >> it. ... > > Does logic dictate that all people are rabid pro-disclosure zealots, > who do not respect copyright, IP rights, nor gentle personal requests > for discretion? > >> ... don't fool yourself into thinking you are somehow being >> responsible ... > > I do not own an over-inflated ego. > >> ... or simply send the code to Oracle and ask them ... > > Sorry to blow your assumption: sent to Oracle, ages ago, first thing. > > Cheers, Paul > > Paul Szabo psz@xxxxxxxxxxxxxxxxx http://www.maths.usyd.edu.au/u/psz/ > School of Mathematics and Statistics University of Sydney Australia >