Replies: 2 comments 6 replies
-
Conceptually I think it could make sense to try to have a date format for these. Ideally it would be start and end dates, but maybe for operational reasons we only require one (either) at time of publication? Date formats are pretty well defined so we should be able to add strong, interoperable validation pretty easily too. Would we want to restrict usage of this date version type to cloud vendors? How do we enforce that if so? |
Beta Was this translation helpful? Give feedback.
-
I've drafted up a variant of a recent CVE, rewritten to use an imaginary This is not a full design; we'd still also need to resolve the specifics of what date/time format is acceptable. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
It's fairly common for open source software to not include a version. It is also common for cloud services to not include a version, at least publicly. Should the CVE Record format include a version type that allows a vulnerable date (start or end date) or range of dates in place of a version or version range? Also, would this be sufficient to meet the requirement for having at least one version in a CVE Record?
Beta Was this translation helpful? Give feedback.
All reactions