[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Multiple 0-days in Dark Comet RAT
- To: "full-disclosure@xxxxxxxxxxxxxxxxx" <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] Multiple 0-days in Dark Comet RAT
- From: Philip Whitehouse <philip@xxxxxxxxx>
- Date: Tue, 9 Oct 2012 17:59:13 +0100
Does 0-day have any meaning any more? It used to mean there were exploits in
the wild used to cause damage before the vendor patched it not merely that a
security researcher found it and disclosed it to the public before the vendor
did.
If a 0 day is everything found by a security team before a vendor then the term
will loose all purpose and meaning because almost all work done by such
researchers is finding vulns. before the vendor.
End rant.
Philip Whitehouse
On 8 Oct 2012, at 21:33, "Hertz, Jesse" <jesse_hertz@xxxxxxxxx> wrote:
> SQL Injection and Arbitrary File Access present in Command and Control server
> of DarkComet RAT
>
> for more info see:
> http://matasano.com/research/PEST-CONTROL.pdf
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/