Welcome to the #dominoforever Product Ideas Forum! The place where you can submit product ideas and enhancement request. We encourage you to participate by voting on, commenting on, and creating new ideas. All new ideas will be evaluated by HCL Product Management & Engineering teams, and the next steps will be communicated. While not all submitted ideas will be executed upon, community feedback will play a key role in influencing which ideas are and when they will be implemented.
For more information and upcoming events around #dominoforever, please visit our Destination Domino Page
"I" did NOT open this Idea (see below). I have had a support ticket open CS0300620 for over 6 months now. I am seeing more and more attempts to use WINK as an attack vector for example trying to get to hosts file etc. We do not use Wink and wanted to understand how to mitigate this potential vulnerability. The response from support was that since the logs only show 404's "there was no vulnerability" .. my view has been (as a CISSP) to worry about the ones that may have actually worked and given a bad actor access to information that could be used to access the system.
~~~~~~~~~~~~~~~~~~~~~~~~~~~2022-09-15 15:14:30 UTC - Christian SinfuegoAdditional commentsHi, Trevor.
As we have already created an enhancement request in the HCL #Dominoforever Product Idea Portal.
Our development team in future releases will come up with a plan, provided it is not hampering any existing functionality of Notes.~~~~~~~~~~~~~~~~~~~~~~~~~~~
https://www.hcltechsw.com/resources/psirt