2017
DOI: 10.48550/arxiv.1705.05347
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Software Vulnerability Analysis Using CPE and CVE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…This sub-element is used to connect a Patch Tag or a Supplemental Tag to a Primary Tag. Additionally, it may be used to associate any source tag to other arbitrary information elements @href, @rel <Meta> This sub-element may be optionally used to provide additional metadata attributes @activationStatus, @colloquialVersion, @edition, @product, @revision <Payload> This optional sub-element aims to provide details regarding additional elements, for instance, files, folders, license keys that may be installed on a device during the installation of a software product <Directory>, <File>, <Process> <Resource> This field incorporates the essential information related to the BoM including the corresponding software component along with its supplier, manufacturer, and license information and the tool used to create the BOM Components Components provide the complete inventory list of the first and third party components and can be represented as coordinates (group, name, version), Package URL [63], Common Platform Enumeration (CPE) [68], SWID [52], or cryptographic hash functions Services…”
Section: Discussionmentioning
confidence: 99%
“…This sub-element is used to connect a Patch Tag or a Supplemental Tag to a Primary Tag. Additionally, it may be used to associate any source tag to other arbitrary information elements @href, @rel <Meta> This sub-element may be optionally used to provide additional metadata attributes @activationStatus, @colloquialVersion, @edition, @product, @revision <Payload> This optional sub-element aims to provide details regarding additional elements, for instance, files, folders, license keys that may be installed on a device during the installation of a software product <Directory>, <File>, <Process> <Resource> This field incorporates the essential information related to the BoM including the corresponding software component along with its supplier, manufacturer, and license information and the tool used to create the BOM Components Components provide the complete inventory list of the first and third party components and can be represented as coordinates (group, name, version), Package URL [63], Common Platform Enumeration (CPE) [68], SWID [52], or cryptographic hash functions Services…”
Section: Discussionmentioning
confidence: 99%
“…However, their approach was unable to account for the significance of each vulnerability, and it might not have been compatible with other security knowledge repositories like CWE. Sanguino and Uetz [9] analyzed the use of CPE (Common Platform Enumeration) and CVE to check for vulnerabilities in Software Products. The outcome demonstrated that the two datasets' inability to synchronise cause the VMS (Vulnerability Management System) to produce inaccurate findings.…”
Section: Related Workmentioning
confidence: 99%
“…The Common Platform Enumeration (CPE) can be practiced to address software and hardware [25]. However, within the framework of the CPE, one can declare a range of ambiguities impeding the revelation [26]. The obstacles of the unambiguous revelation are not within the scope of this paper.…”
Section: Related Workmentioning
confidence: 99%