You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
At the 2023-12-14 TWG meeting, the discussion suggested that, during testing of the 5.1.0 schema, any CVE Record that validated even though the record format was not "intended" would be considered a "loophole."
It might not be intended that CVE Records use source.discovery in a different way than Vulnogram.
Vulnogram, by default, inserts "source": { "discovery": "UNKNOWN" } into a CVE Record.
minimal/plausible test case (the CNA chooses to specify a language for the word "UNKNOWN")
This is similar to #212 but does not require an x_ field. A possible solution is to require source.discovery to have a string value (not allow an object), so that all CVE Records are structurally consistent with how Vulnogram uses the source.discovery field.
The text was updated successfully, but these errors were encountered:
At the 2023-12-14 TWG meeting, the discussion suggested that, during testing of the 5.1.0 schema, any CVE Record that validated even though the record format was not "intended" would be considered a "loophole."
It might not be intended that CVE Records use source.discovery in a different way than Vulnogram.
Vulnogram, by default, inserts
"source": { "discovery": "UNKNOWN" }
into a CVE Record.minimal/plausible test case (the CNA chooses to specify a language for the word "UNKNOWN")
This is similar to #212 but does not require an x_ field. A possible solution is to require source.discovery to have a string value (not allow an object), so that all CVE Records are structurally consistent with how Vulnogram uses the source.discovery field.
The text was updated successfully, but these errors were encountered: