|
BugTraq
0day: PDF pwns Windows Sep 20 2007 01:21PM pdp (architect) (pdp gnucitizen googlemail com) (3 replies) Re: [Full-disclosure] 0day: PDF pwns Windows Sep 21 2007 07:53PM Thierry Zoller (Thierry Zoller lu) (2 replies) Re: [Full-disclosure] 0day: PDF pwns Windows Sep 21 2007 09:21PM Aaron Collins (collinsa ehawaii gov) Re: [Full-disclosure] 0day: PDF pwns Windows Sep 21 2007 09:21PM Kevin Finisterre (lists) (kf_lists digitalmunition com) Re: 0day: PDF pwns Windows Sep 20 2007 03:29PM Gadi Evron (ge linuxbox org) (1 replies) Re: 0day: PDF pwns Windows Sep 20 2007 11:16PM Crispin Cowan (crispin novell com) (2 replies) Re: 0day: PDF pwns Windows Sep 23 2007 05:34AM Crispin Cowan (crispin novell com) (2 replies) Re: 0day: PDF pwns Windows Sep 23 2007 11:52PM Chad Perrin (perrin apotheon com) (2 replies) Re: 0day: PDF pwns Windows Sep 24 2007 10:57PM Lamont Granquist (lamont scriptkiddie org) (1 replies) |
|
Privacy Statement |
> The exploit is not made public by its use. The exploit is not even
> made public by (back-channel) sharing amongst the hacker/cracker
> community. The exploit is only made public if detected or the
> vulnerability is disclosed. Until detected/disclosed the hacker/
> cracker can use their 31337 0day spl01tz to break into whichever
> vulnerable machines they like. 0day exploits are valuable because
> the opposition is ignorant of them.
>
> Posting exploits to BUGTRAQ, however, inherently makes them not
> 0day...
And my ignorant self thought until this thread that the "0" in the
term referred to the number of days of head start granted to the
vendor. Silly me. Because that would make all vulnerabilities
published without prior warning to the vendor a "0day"...
Roland (who seems to remember that this was once the meaning of this
term)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (Darwin)
iD8DBQFG+UwvI4MWO8QIRP0RAnIDAJ9/vdM7MKsf4nSaWRFkU5CKjF0QZACcDwRp
AqhjKJOfM+5Rcf1GfJxy93s=
=9DaC
-----END PGP SIGNATURE-----
[ reply ]