[Full-disclosure] netdev threadjack
mastahflank at gmail.com
Sat Apr 12 18:59:19 BST 2008
Enough, I'm filter this fuck.
Sent from my BlackBerry® smartphone with SprintSpeed
From: n3td3v <xploitable at gmail.com>
Date: Sat, 12 Apr 2008 18:17:57
To:"Randal T. Rioux" <randy at procyonlabs.com>,full-disclosure at lists.grok.org.uk, n3td3v <n3td3v at googlegroups.com>
Subject: Re: [Full-disclosure] netdev threadjack
What about Gadi Evron threadjacks? He is as bad as me:
Impressive vulnerability, new. Not a 0day.
Not to start an argument again, but fact is, people stop calling
everything a 0day unless it is, say WMF, ANI, etc. exploited in the wild
without being known.
I don't like the mis-use of this buzzword.
Okay. I think we exhausted the different views, and maybe we are now able
to come to a conlusion on what we WANT 0day to mean.
What do you, as professional, believe 0day should mean, regardless of
Obviously, the term has become charged in the past couple of years with
the targeted office vulnerabilities attacks, WMF, ANI, etc.
We require a term to address these, just as much as we do "unpatched
vulnerability" or "fully disclosed vulnerability".
What other such descriptions should we consider before proceeding?
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
Full-Disclosure is hosted and sponsored by Secunia.