Replies: 1 comment
-
|
I'm glad to see that I'm not the only one requesting this feature openvex/spec#60 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I’m not sure this is the best way to frame it, but it would be a valuable addition to OpenVEX statements to support risk contextualization. This would allow maintainers to adjust the raw CVE severity based on context, helping bridge the gap between simple affected / not_affected statements.
For example, a
contextualized_cvssorcontextualized_scorefield could capture cases where a CVE is detected and the package is present, but the vulnerable code path is not used or is otherwise mitigated, resulting in minimal/reduced impact.Beta Was this translation helpful? Give feedback.
All reactions