|
|
Kurt – We agree completely with you, and we provided CVE-2016-5119 to the requester last month. Regards, The CVE Team From: Kurt Seifried [mailto:kseifried@redhat.com]
On Tue, Jun 7, 2016 at 9:14 PM, Common Vulnerabilities & Exposures <cve@mitre.org> wrote:
By definition if people are asking for CVE's for a security vulnerability they want them to exist. As well as a user of various Open Source and closed source products I want to be an informed consumer, the easiest way to do this currently
is with CVEs (issues are consolidated in a single easily searched database, as opposed to many vendor sites which (intentionally?) make it hard to find security information about their products.
So for example we have KeePass 2 which refuses to fix their HTTP update check because it would cost the developer ad revenue: so not only do we have a known security vulnerability, but we have a vendor flat out refusing to fix it, now I'm going to assume users of KeePass2 would like to know this, and I find it unlikely the vendor will inform them. As such a CVE
(with it's resulting propagation to vulnerability management services) is one of the better ways to ensure people get notified.
-- -- |