Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Multiple 0-days in Dark Comet RAT
From: Philip Whitehouse <philip () whiuk com>
Date: Tue, 9 Oct 2012 17:59:13 +0100

Does 0-day have any meaning any more? It used to mean there were exploits in the wild used to cause damage before the 
vendor patched it not merely that a security researcher found it and disclosed it to the public before the vendor did.

If a 0 day is everything found by a security team before a vendor then the term will loose all purpose and meaning 
because almost all work done by such researchers is finding vulns. before the vendor.

End rant.

Philip Whitehouse

On 8 Oct 2012, at 21:33, "Hertz, Jesse" <jesse_hertz () brown edu> wrote:

SQL Injection and Arbitrary File Access present in Command and Control server of DarkComet RAT

for more info see:
http://matasano.com/research/PEST-CONTROL.pdf
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]