|
|
A few collected responses...
On 2015-12-22 15:22, Eugene H. Spafford wrote:
On 2015-12-22 14:28, Kurt Seifried wrote:
> I think we should really split the problem into:
>
> 1) assigning CVEs
>
> 2) the CVE database
>
> as #1 can happily exist with or without #2.
This is an important point. #1 is identification, this thing is called
CVE-X. Some amount of information (#2) is needed to perform #1 --
uniqueness determination at least. That amount could be reduced at the
cost of more duplicates or overall less short-term quality for #2.