CVE Behind the Scenes - The Complexity of Being Simple

CVE Behind the Scenes - The Complexity of Being Simple

Black Hat via YouTube Direct link

Criteria for a Good CVE

6 of 28

6 of 28

Criteria for a Good CVE

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

CVE Behind the Scenes - The Complexity of Being Simple

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 CVE at a Glance
  3. 3 CVE Editorial Board Members (As of June 4, 2001)
  4. 4 Vision: Using CVE in the Enterprise
  5. 5 CVE Enables Detailed Product Comparisons
  6. 6 Criteria for a Good CVE
  7. 7 Issue: What is a Vulnerability?
  8. 8 Issue: What is a Real Vulnerability?
  9. 9 Issue: What is a known Vulnerability?
  10. 10 Identifying Known Vulnerabilities: The CVE Submission Stage
  11. 11 Submission Conversion
  12. 12 Normalizing Keywords
  13. 13 Submission Matching
  14. 14 Submission Refinement
  15. 15 Some Challenges in Refinement
  16. 16 Content Decisions
  17. 17 Example Content Decision: SF-LOC (Software Flaws/Lines of Code)
  18. 18 SF-LOC Examples
  19. 19 Example Content Decision: SF-EXEC (Software Flaws in Multiple Executables)
  20. 20 Other Example Abstraction CD's
  21. 21 Example Inclusion CD's
  22. 22 Candidate Stage: Reservation
  23. 23 Candidate Reservation Process
  24. 24 CVE Growth
  25. 25 What's in a Name?
  26. 26 What's Open
  27. 27 Top Ten Vulnerability Types in CVE (Issues publicized between Jan 2000 and April 2001)
  28. 28 Managing Perspectives

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.