Quote:
Originally posted by BenH
So in other words, you cannot give any intelligent counters to the points I raised, I'm a nasty horrible person, and your running away.
|
No - I just no longer want to argue with a person who questions others abilities and insults them (as you are trying to do again here) to try and prove they are right.
If you do a little research you will see that there are pretty far ranging exploits on pretty much all OS's and many different open and closed source software products.
One pretty serious vulnerability was with SSH and an exploit that would allow a 3rd party to run code with the same privileges as the ssh process.
How about one that affected the Sun RPC XDL library that could lead to the running of arbitrary code.
I suggest you take a look at somewhere like the CVE or CERT a little more often.
Now this is the last I am saying on this as everyone on this thread is getting bored with this, as am I.