Re: PROPOSAL: Cluster 20 - DESIGN (27 candidates)
Okay, then if you want to list anything that *might* be considered a
vulnerability, I want to see an entry for each version of Windows.
Running it is a vulnerability that can lead to compromise.
Then, one entry for each version of Unix, and one for each version of Linux.
Then, one for each WWW browser capable of running applets or doing
downloads, and one for every MIME-capable mailer.
If you are going to be kitchen sink repository, let's go right to the
source of the plumbing problems, so to speak.