CVE Behind the Scenes - The Complexity of Being Simple
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
CVE at a Glance
CVE Editorial Board Members (As of June 4, 2001)
Vision: Using CVE in the Enterprise
CVE Enables Detailed Product Comparisons
Criteria for a Good CVE
Issue: What is a Vulnerability?
Issue: What is a Real Vulnerability?
Issue: What is a known Vulnerability?
Identifying Known Vulnerabilities: The CVE Submission Stage
Submission Conversion
Normalizing Keywords
Submission Matching
Submission Refinement
Some Challenges in Refinement
Content Decisions
Example Content Decision: SF-LOC (Software Flaws/Lines of Code)
SF-LOC Examples
Example Content Decision: SF-EXEC (Software Flaws in Multiple Executables)
Other Example Abstraction CD's
Example Inclusion CD's
Candidate Stage: Reservation
Candidate Reservation Process
CVE Growth
What's in a Name?
What's Open
Top Ten Vulnerability Types in CVE (Issues publicized between Jan 2000 and April 2001)
Managing Perspectives
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube