|
Message-ID: <9bc2be74-b98d-87ef-f96c-427c53c3db55@thermi.consulting>
Date: Fri, 25 Dec 2020 12:30:40 +0100
From: Noel Kuntze <noel.kuntze@...rmi.consulting>
To: oss-security@...ts.openwall.com, Jeffrey Walton <noloader@...il.com>
Subject: Re: More CVE request experience (Fwd: Automatic reply:
[EXT] Need a CVE for Crypto++)
Hello Jeffrey,
The form worked fine just now. What is the issue with it?
Kind regards
Noel
Am 25.12.20 um 03:13 schrieb Jeffrey Walton:
> The form at https://cveform.mitre.org/ is broken. Emailing
> cve@...re.org for a CVE assignment after the failed web submission
> results in this.
>
> I hope people do not see the drop in CVE submissions as an improvement
> in software quality.
>
> ---------- Forwarded message ---------
> From: Common Vulnerabilities & Exposures <cve@...re.org>
> Date: Thu, Dec 24, 2020 at 9:08 PM
> Subject: Automatic reply: [EXT] Need a CVE for Crypto++
> To: Walton, Jeffrey <noloader@...il.com>
>
> This email address is not monitored.
>
> To contact the CVE Program, use https://cveform.mitre.org and choose
> “Other” from the dropdown menu.
Download attachment "OpenPGP_signature" of type "application/pgp-signature" (841 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.