Remix.run Logo
Lorin 4 hours ago

What is the rationale behind naming CVEs and individual domains? Marketing?

diath 3 hours ago | parent | next [-]

It's an advertisement for their tool that found the exploit: https://copy.fail/#contact, https://xint.io/products/xint-code

john_strinlai 3 hours ago | parent | prev | next [-]

can you remember what CVE-2021-44228 is without looking it up? CVE-2014-6271? CVE-2017-5753?

i bet if i told you their names, you would instantly know what vulns those are.

its easier to talk about things with names. it hurts no one. it takes approximately no effort or time.

CVEs are, for whatever reason, like the only thing on the planet that people seem to have a problem with when they receive a name. i am not sure why.

QuantumNomad_ 3 hours ago | parent [-]

> CVEs are, for whatever reason, like the only thing on the planet that people seem to have a problem with when they receive a name. i am not sure why.

What, you guys talk about books based on their “title” instead of just memorising the ISBN of each book? Pssh, count me disappointed!

john_strinlai 3 hours ago | parent [-]

after work i have to stop at Y87794H0US1R65VBXU25 for some groceries.

akerl_ 2 hours ago | parent [-]

I only refer to my kids by their social security numbers until they do something suitably remarkable.

I guess it’s a good thing I’m not a SovCit or I’d just have to call them Traveller Three and Traveller Four

evanjrowley 3 hours ago | parent | prev | next [-]

The AI generated prose screams marketing. Marketing is why there's a "Contact our Security Team" form at the bottom of the page.

skilled 3 hours ago | parent | prev | next [-]

Probably to some extent it is marketing, but generally it has to do with significant bug finds to get the message out to the people who need to apply patches and/or be informed. Heartbleed, Log4Shell, etc.

Very few CVE’s get names dedicated to them like this, because usually when they do - it is very serious, as in this case.

tptacek 3 hours ago | parent | prev | next [-]

It's certainly marketing, but it's prosocial: there's no scarcity of names, and "copy.fail" is much easier to remember and talk about than "CVE-2026-31431".

eddythompson80 3 hours ago | parent | prev | next [-]

Giving catchy names for bad exploits has been a thing for a while. Probably to make sure it's easy to reference and make sure you're patches as opposed to passing numbers around. Heartbleed, Shellshock, BEAST, Goto Fail, etc

dgellow 3 hours ago | parent | prev | next [-]

Yes, originally it was to help spread awareness. Now it has become more of a gimmick I would say

ronsor 4 hours ago | parent | prev | next [-]

It makes sure people don't forget about the vulnerabilities, at least

Fuzzbit 3 hours ago | parent | prev [-]

Same reason they name storms, numbers scare normies