Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 10 Jun 2015 10:33:58 -0400 (EDT)
From: cve-assign@...re.org
To: marek.sebera@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Possible XSS vulnerability on NIST NVD

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1729
> 
> Do you think it's worth a XSS CVE against NIST NVD web?

We believe any issues related to
https://web.nvd.nist.gov/view/vuln/detail URLs aren't eligible for CVE
IDs because the view/vuln/detail program is site-specific code used
only at NVD.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVeEovAAoJEKllVAevmvmsQCsIAIesGEHsjeJV7TGS+642qmY3
xhixEiQu0xTT9e2h8cYnakWpgO+IUC0QXc+cLyoUKZcx5ZnaG/bYKaqVAQCW1+eW
x70gDMZ/50KvLkw00iDxgKPzAjpGNeQ2DGoBcERnRCobFpd6+eIcdRvTnkttzx6M
DNn7p8h/otRGksHYU3g+sKpjz/Fcx7XG6v895xeIS8zuSvsG0eN+pgFTmrbo2ERV
02kLxY0xjP5VAzBgm70Pzgw756/k7sSvPgklsCIpukNeAlEGAtyCDDKLysYlUjYN
oX+oBbq/VmsQULoNDjYsYevUiDWkYpX6rbFD4Aan+SaHo0vDbbCPJkbTfhVoma8=
=cA8m
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ