Good morning!



Sorry to bother you. I am conducting a study on determining the impact range of 
vulnerabilities. My research primarily uses the SZZ method to identify the 
affected versions of a vulnerability through patch analysis[1].




Previously, I had also emailed you to ask some questions. For example, 
regarding CVE-2022-43551[2], you mentioned that earlier versions might not be 
vulnerable due to HSTS feature was not enabled by default and was labled as 
experimental. So I'm wondering what the significance of doing this work is. For 
the reason,I would like to ask, how do you determine the impact range of a 
vulnerability? Do you rely on dynamic analysis by running a Proof-of-Concept 
(PoC) or static code review?




This would be an important contribution to open-source software, as it could 
significantly reduce the time required for manually determining affected 
versions!




Thanks!




[1] https://dl.acm.org/doi/10.1145/3510003.3510113

[2] https://curl.se/docs/CVE-2022-43551.html
-- 
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to