Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Feb 2017 10:28:22 +0200
From: Henri Salo <henri@...v.fi>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com
Subject: Re: MITRE is adding data intake to its CVE ID process

On Mon, Feb 13, 2017 at 04:40:29PM +0000, Priedhorsky, Reid wrote:
> However, our understanding of CVE consumers is that they look to MITRE as a
> source of vulnerability information after a CVE ID number exists, not before.

Lots of users are also fetching the CVE database and try to match it with their
installed software to get notified of new vulnerabilities affecting their infra
and used products.

-- 
Henri Salo

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ