-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Question on whether we should populate older CVE entries #80
Comments
Hi @cplvic, |
I agree with @jasinner. I'd welcome the inclusion of older CVE's but it hasn't been a priority in the past (mainly due to time). |
Cool, I'll check out the script |
Follow on questions, we use cvssv2 scores today. any thoughts on including v3 as well? |
@cplvic I welcome the addition, though we'd probably start using it in the next iteration of the API. |
Looking at this link: https://www.cvedetails.com/vulnerability-list/vendor_id-45/product_id-6117/Apache-Struts.html
Its clear that CVE-2017-5638 (already entered) is so severe that it trumps any prior entry. But in many cases, Security teams will evaluate and look at mitigations. If the database is not fully populated, they may risk accept a newer vulnerability and never know about an older one. For victims to be truly useful, it should approach 100% accuracy imho. But that depends
@jasinner
Is the idea of this tool to be a quick supplemental to a primary use tool?
The text was updated successfully, but these errors were encountered: