microsoft/CCF: Confidential Consortium Framework - ccf automation
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
Site Privacy | Accessibility | Privacy Program | Copyrights | Vulnerability Disclosure | No Fear Act Policy | FOIA | Environmental Policy | Scientific Integrity | Information Quality Standards | Commerce.gov | Science.gov | USA.gov
Official websites use .gov A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
J. J. Keller protects people and the businesses they run. You can trust our expertise across a wide range of subjects relating to labor, transportation, environmental, and worker safety. Our deep knowledge of federal and state agencies is built on a strong foundation of more than 100 editors and consultants and 70+ years of regulatory compliance experience.
J. J. Keller protects people and the businesses they run. You can trust our expertise across a wide range of subjects relating to labor, transportation, environmental, and worker safety. Our deep knowledge of federal and state agencies is built on a strong foundation of more than 100 editors and consultants and 70+ years of regulatory compliance experience.
The wp-publications WordPress plugin through 1.2 does not escape filenames before outputting them back in the page, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).