<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="https://oss-security.openwall.org/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://oss-security.openwall.org/wiki/feed.php">
        <title>OSS-Security disclosure</title>
        <description></description>
        <link>https://oss-security.openwall.org/wiki/</link>
        <image rdf:resource="https://oss-security.openwall.org/wiki/lib/tpl/local/images/favicon.ico" />
       <dc:date>2026-04-17T02:14:51+02:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://oss-security.openwall.org/wiki/disclosure/cve?rev=1401929542&amp;do=diff"/>
                <rdf:li rdf:resource="https://oss-security.openwall.org/wiki/disclosure/project?rev=1382571095&amp;do=diff"/>
                <rdf:li rdf:resource="https://oss-security.openwall.org/wiki/disclosure/researcher?rev=1211521839&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://oss-security.openwall.org/wiki/lib/tpl/local/images/favicon.ico">
        <title>OSS-Security</title>
        <link>https://oss-security.openwall.org/wiki/</link>
        <url>https://oss-security.openwall.org/wiki/lib/tpl/local/images/favicon.ico</url>
    </image>
    <item rdf:about="https://oss-security.openwall.org/wiki/disclosure/cve?rev=1401929542&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-06-05T02:52:22+02:00</dc:date>
        <title>disclosure:cve</title>
        <link>https://oss-security.openwall.org/wiki/disclosure/cve?rev=1401929542&amp;do=diff</link>
        <description>CVE

Common Vulnerabilities and Exposures (CVE) IDs are a unique identifiers given to security flaws.  The CVE FAQ describes it best. CVE has be come a de facto standard for identifying vulnerabilities and security flaws.
A1. What is CVE?

CVE is a list of information security vulnerabilities and exposures that aims to provide common names for publicly known problems. The goal of CVE is to make it easier to share data across separate   
vulnerability capabilities (tools, repositories, and servic…</description>
    </item>
    <item rdf:about="https://oss-security.openwall.org/wiki/disclosure/project?rev=1382571095&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-10-24T01:31:35+02:00</dc:date>
        <title>disclosure:project</title>
        <link>https://oss-security.openwall.org/wiki/disclosure/project?rev=1382571095&amp;do=diff</link>
        <description>Project Disclosure

All software contains bugs.  A subset of those bugs are security flaws that allows a malicious individual to cause software to do something it shouldn't do.  The best example of this is when a remote attacker leverages a flaw in a public facing service (web server or mail server for example), which then allows them access to machine resources.</description>
    </item>
    <item rdf:about="https://oss-security.openwall.org/wiki/disclosure/researcher?rev=1211521839&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2008-05-23T07:50:39+02:00</dc:date>
        <title>disclosure:researcher</title>
        <link>https://oss-security.openwall.org/wiki/disclosure/researcher?rev=1211521839&amp;do=diff</link>
        <description>Researchers have an especially unique challenge when reporting flaws in Open Source Software.  There are countless groups that the flaw could be reported to, and many of them don't have any sort of formal security contact.  The purpose of this guide is to help give unfamiliar Researchers guidance when reporting security flaws they find in Open Source Software.</description>
    </item>
</rdf:RDF>
