for those who missed it (like me), SQL injection is over 25 years old and predates CVE, the first writeup having been published on December 25, 1998, by Rain Forest Puppy in Phrack. If you're interested in how this was tracker, I bet there are some fun non-standard descriptions in the early CVEs.
This is a story about CISA.
About what it meant and means to someone in the trenches. Years ago, and now.
I also distinctly remember spending a lot of effort in modeling "vuln complexity" with Carsten Eiram and his colleagues (maybe during the Risk Based Security days?), but if I recall correctly, we proposed a talk to one of the major Vegas cons, but it got rejected, and I didn't pursue it further. Not that I'm bitter, but it seemed worth mentioning to anybody else who's felt the sting of infosec rejection ;-) 7/7.
Finally: as with all cited ideas in the cyberz, the "Unforgivable Vulnerabilities" paper did not occur in a vacuum. No doubt I missed, dismissed, or misinterpeted many other ideas and publications at the time or earlier, but: for other work that bears revisiting, see David Litchfield's "Vulnerability Assessment Assurance Levels (VAAL)" proposal from 2006 (
https://seclists.org/fulldisclosure/2006/May/304). 6/x

Full Disclosure: How secure is software X?
For me, one of the coolest aspects of the NCSC paper is its use of CWE's classification scheme for broad types of mitigations. I'd hoped to see more of this over the years, or even some kind of criticism, but I'm glad to see it's being used now. There's still plenty of work to do in mitigation classification and improving coverage across the entire CWE corpus (... and also D3FEND etc.), but personally, I'm really happy to see the growing interest in software security on a macro level. 5/x