On Tue, 9 Oct 2012 17:59:13 +0100 Philip Whitehouse <[email protected]> wrote:
> Does 0-day have any meaning any more? It used to mean there were > exploits in the wild used to cause damage before the vendor patched > it not merely that a security researcher found it and disclosed it to > the public before the vendor did. > > If a 0 day is everything found by a security team before a vendor > then the term will loose all purpose and meaning because almost all > work done by such researchers is finding vulns. before the vendor. I suppose it turns into a 0 day when you post it on this mailing list and happen to be in the mood to put the vendor's marketing division on BCC. -1 day could be when you ask a friend to check your mail to this ML for major grammar errors before you post it. > End rant. > > Philip Whitehouse > > On 8 Oct 2012, at 21:33, "Hertz, Jesse" <[email protected]> wrote: > > > SQL Injection and Arbitrary File Access present in Command and > > Control server of DarkComet RAT > > > > for more info see: > > http://matasano.com/research/PEST-CONTROL.pdf > > _______________________________________________ > > Full-Disclosure - We believe in it. > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > > Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
