| Advisory |
Vendor published statement on a validated vulnerability and instructions how to handle this issue. |
| Component |
See description of component. |
| COTS |
Commercial off-the-shelf: Components / products sold ready to use. These components are not customized. |
| CPE |
Common Platform Enumeration: structured naming scheme for IT components provided by NIST National Vulnerability Database (NVD) |
| CVE |
Common Vulnerabilities and Exposures: a unique, alphanumeric identifier assigned by the CVE Program, referencing a specific vulnerability |
| CVE completeness |
See description of notification |
| CVSS |
Common Vulnerability Scoring System is an open framework for communicating the characteristics and severity of vulnerabilities. |
| EOL |
End of Life date, see description of component. |
| Monitoring List |
See description of monitoring list. |
| Monitoring List Owner |
Subscribers of a monitoring list who have the permission to modify the list, i.e. adding or removing subscribers, adding or removing components, editing its basic data, or deleting the list entirely. |
| Monitoring List Subscriber |
User assigned to a monitoring list and will therefore receive notifications emails containing relevant notifications. |
| Notification |
See description of notification. |
| Notifications Email |
See description of notifications email. |
| OSS |
Open-source software: Software (components) from source code that is free available, but not always for free. |
| Security Notification |
See description of notification. |
| Vilocify |
Vulnerability Intelligence Service |
| Vulnerability |
Weakness of an component (or product) that can be exploited by an attacker |