lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 28 Jul 2008 23:40:13 +0100
From: n3td3v <xploitable@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: how to request a cve id?

Hi,

How did something gay like
http://www.securityfocus.com/archive/1/494843/30/0/threaded this get a
CVE ID? And when I click on it,
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3100 it says
"under review"? What's this gay shit is script kiddies with XSS
getting CVE ID's to look elite? Lmfao.

All the best,

n3td3v

On Sat, Jul 26, 2008 at 6:08 PM, Steven M. Christey
<coley@...us.mitre.org> wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> CVE requests can be sent to cve@...re.org or to me directly.  My PGP
> key is below, or accessible from the MIT public key server.
> Alternately, you can request them from Candidate Numbering Authorities
> (CNAs) which include the security teams at Red Hat, Microsoft, and
> Debian, or third-party coordinators including iDefense and CERT/CC.
>
> The amount of information you need to provide can vary and is somewhat
> negotiable.  We need to be sure how many CVEs to assign.
>
> Naturally, there is no charge for CVE requests.  We encourage people
> to try to coordinate with the vendor, since the quality of information
> almost always suffers if you don't do so.
>
>
> Steve Christey
> CVE Editor
>
>
> - -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: GnuPG v1.4.4 (SunOS)
>
> mQCNAzh/k3wAAAEEAOmU/KL0g6+QQTt7AF0QQHPkkJXDYAgLJFhkk0vCxxsi8UzT
> HaFEbpT7WSzpnq/vhfoh+R6tSGhSQm6lJfhDSajqldrfpw4vCxYUWsi7H6tZlGbt
> Rd9z+VxW/t8AhkJ2cJE/M7OLoW26aOH/zwA5DdT6WUazFFBqspytTMxw0qbBAAUR
> tChTdGV2ZSBDaHJpc3RleSBJbmZvc2VjIDxjb2xleUBtaXRyZS5vcmc+iQCVAwUQ
> Oa6sHJytTMxw0qbBAQGCeQP/TwVsIy+XrKH+XVeV4aneOL2LbyPStFI8wmBQXbC7
> uKkvTnO2oPiYmFBzpatccQX+SfJZiQmRe2hG8O6Jf0vQCOoEi3Jpa+de32d53MOo
> mLrsBBrMNwYtTG9SlVQbUT56Iln/LwzQ0C6thNf/jn5Zv/3TEEo2dt8Ymh+Ip4qQ
> SX2JAJUDBRA8s30DnK1MzHDSpsEBAd27BACYP/f8u2K0dN/fHKOy0KWRUfCfarPa
> aNnRsMVuWYxxbhP4MCcpUeHyqiEZI71zxwQq4FaFU8ojH5KrQGCiPUQcGtq14qHb
> 0xIfKqoX0V8eOiM94fQzMaeH9pU4TCmT861qVzm0ltARoz7X4u63PDbQydrBxxgF
> 55CZgzW0Y47DXIkAlQMFEDmuq4vTGqO/S5EkrQEBRpMD/jTUNxMiUQXD1wewZJoD
> ZDOkBy7sOW9qUzNQlPUG0KmJ+pBzacsKMuMVXZWXwERufoUuXPg1rZRweCD8FGDA
> 6fkYohdM4ojQd0ujgdCN8zQGbRBxTMe/Ub9TRG7vmLRq2QsOFRYhhK+Gggs15HYe
> 6Ea3rMWUqP0yd/kxuBNZ0QMkiEYEEBECAAYFAj5ajeMACgkQSt01hEsKzCrcogCg
> 19yplSUq1vxpXdh/NfT3sF+4i20AoP82mT/6lrh5LcNxDh70LFsBpNl2iQCVAwUT
> QNn0uoqHRg3pndX9AQEGWQP/RJFAUO9slTd6cwj5OglfB1jE8zt4GSoXV0nMGs8C
> oaSLdRjW/vbkL5ypQQZoARCn92v1RAOJNch1OpXO4oupxn0KbkH1YcbSEHc89Mno
> gWB+TtYJeEExS5EBGvi9JHfDAeF0FU48JPrEd+gp5rRQZLWvh4FcIrU8O2rA0+TE
> GO8=
> =kBVP
> - -----END PGP PUBLIC KEY BLOCK-----
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.4 (SunOS)
>
> iQCVAwUBSItZmZytTMxw0qbBAQKq0QP+L7+oW3sI8IbDCNbrvWviD5KZovbUmtjY
> PEhJKSt/rTMePDdhfwAqvtlSejg+NOFyYqBUSBk7A/ZrFfB185C+5Ea/siSJU6ZU
> nNRUX44aSRB3HWqgjRDR7riy2Lgp3N9IvmKyhk65Q8ED9qFH8DreOLevXBCMUF15
> k/jBw1VmyOI=
> =fhV+
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ