[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] how to request a cve id?
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] how to request a cve id?
- From: n3td3v <xploitable@xxxxxxxxx>
- Date: Mon, 28 Jul 2008 23:40:13 +0100
Hi,
How did something gay like
http://www.securityfocus.com/archive/1/494843/30/0/threaded this get a
CVE ID? And when I click on it,
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3100 it says
"under review"? What's this gay shit is script kiddies with XSS
getting CVE ID's to look elite? Lmfao.
All the best,
n3td3v
On Sat, Jul 26, 2008 at 6:08 PM, Steven M. Christey
<coley@xxxxxxxxxxxxxxx> wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> CVE requests can be sent to cve@xxxxxxxxx or to me directly. My PGP
> key is below, or accessible from the MIT public key server.
> Alternately, you can request them from Candidate Numbering Authorities
> (CNAs) which include the security teams at Red Hat, Microsoft, and
> Debian, or third-party coordinators including iDefense and CERT/CC.
>
> The amount of information you need to provide can vary and is somewhat
> negotiable. We need to be sure how many CVEs to assign.
>
> Naturally, there is no charge for CVE requests. We encourage people
> to try to coordinate with the vendor, since the quality of information
> almost always suffers if you don't do so.
>
>
> Steve Christey
> CVE Editor
>
>
> - -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: GnuPG v1.4.4 (SunOS)
>
> mQCNAzh/k3wAAAEEAOmU/KL0g6+QQTt7AF0QQHPkkJXDYAgLJFhkk0vCxxsi8UzT
> HaFEbpT7WSzpnq/vhfoh+R6tSGhSQm6lJfhDSajqldrfpw4vCxYUWsi7H6tZlGbt
> Rd9z+VxW/t8AhkJ2cJE/M7OLoW26aOH/zwA5DdT6WUazFFBqspytTMxw0qbBAAUR
> tChTdGV2ZSBDaHJpc3RleSBJbmZvc2VjIDxjb2xleUBtaXRyZS5vcmc+iQCVAwUQ
> Oa6sHJytTMxw0qbBAQGCeQP/TwVsIy+XrKH+XVeV4aneOL2LbyPStFI8wmBQXbC7
> uKkvTnO2oPiYmFBzpatccQX+SfJZiQmRe2hG8O6Jf0vQCOoEi3Jpa+de32d53MOo
> mLrsBBrMNwYtTG9SlVQbUT56Iln/LwzQ0C6thNf/jn5Zv/3TEEo2dt8Ymh+Ip4qQ
> SX2JAJUDBRA8s30DnK1MzHDSpsEBAd27BACYP/f8u2K0dN/fHKOy0KWRUfCfarPa
> aNnRsMVuWYxxbhP4MCcpUeHyqiEZI71zxwQq4FaFU8ojH5KrQGCiPUQcGtq14qHb
> 0xIfKqoX0V8eOiM94fQzMaeH9pU4TCmT861qVzm0ltARoz7X4u63PDbQydrBxxgF
> 55CZgzW0Y47DXIkAlQMFEDmuq4vTGqO/S5EkrQEBRpMD/jTUNxMiUQXD1wewZJoD
> ZDOkBy7sOW9qUzNQlPUG0KmJ+pBzacsKMuMVXZWXwERufoUuXPg1rZRweCD8FGDA
> 6fkYohdM4ojQd0ujgdCN8zQGbRBxTMe/Ub9TRG7vmLRq2QsOFRYhhK+Gggs15HYe
> 6Ea3rMWUqP0yd/kxuBNZ0QMkiEYEEBECAAYFAj5ajeMACgkQSt01hEsKzCrcogCg
> 19yplSUq1vxpXdh/NfT3sF+4i20AoP82mT/6lrh5LcNxDh70LFsBpNl2iQCVAwUT
> QNn0uoqHRg3pndX9AQEGWQP/RJFAUO9slTd6cwj5OglfB1jE8zt4GSoXV0nMGs8C
> oaSLdRjW/vbkL5ypQQZoARCn92v1RAOJNch1OpXO4oupxn0KbkH1YcbSEHc89Mno
> gWB+TtYJeEExS5EBGvi9JHfDAeF0FU48JPrEd+gp5rRQZLWvh4FcIrU8O2rA0+TE
> GO8=
> =kBVP
> - -----END PGP PUBLIC KEY BLOCK-----
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.4 (SunOS)
>
> iQCVAwUBSItZmZytTMxw0qbBAQKq0QP+L7+oW3sI8IbDCNbrvWviD5KZovbUmtjY
> PEhJKSt/rTMePDdhfwAqvtlSejg+NOFyYqBUSBk7A/ZrFfB185C+5Ea/siSJU6ZU
> nNRUX44aSRB3HWqgjRDR7riy2Lgp3N9IvmKyhk65Q8ED9qFH8DreOLevXBCMUF15
> k/jBw1VmyOI=
> =fhV+
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/