Skip to content

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

METABUG: Potential concrete data quality improvements for 5.2.0 #298

Closed
andrewpollock opened this issue Apr 10, 2024 · 2 comments
Closed
Labels
invalid This doesn't seem right

Comments

@andrewpollock
Copy link

andrewpollock commented Apr 10, 2024

I thought I'd capture an umbrella issue for discussing a package of improvements for 5.2.0

A possible use-case based approach:

Use case 1: "Does this vulnerability apply to me?" "How do I make it not apply to me?"

Use case 2: "How do I prioritize the vulnerabilities that apply to me?"

  • I have CVSS, EPSS etc scores to stack rank the vulnerabilities identifiable from use case 1, so that I can determine the next steps for responding to them

Use case 3: "How can I perform aggregate, historical analytics on the vulnerabilities that apply/did apply to me?"

  • I can broadly bucket vulnerabilities to answer questions like "How many memory safety vulnerabilities impacted me last year?"

Some other general input validation issues worth noting here:

Related validation work happening elsewhere:

@jayjacobs
Copy link
Collaborator

@andrewpollock Maybe I am missing something, but this looks like a collection other issues and is not a unique request on its own. I would move to close this and we can group relevant issues with labels and milestones (hopefully in the next few weeks). Let me know if you have different thoughts.

@andrewpollock
Copy link
Author

The overarching request here is for a future version of the schema to enable records to meet the three use cases described.

This could be achieved incrementally, by addressing one use case at a time.

Happy for this outcome to be reached by the most appropriate means.

@CVEProject CVEProject locked and limited conversation to collaborators Jan 10, 2025
@ccoffin ccoffin converted this issue into discussion #384 Jan 10, 2025

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

Labels
invalid This doesn't seem right
Projects
None yet
Development

No branches or pull requests

2 participants