-
Notifications
You must be signed in to change notification settings - Fork 231
Extract interesting data from CVE and other vulnerabilities body #551
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Paths should be fairly easy to extract using textcode. |
To expand on this a bit more, there are certain identifiers I would be very interested in. One of those is searching by chipset. There are CVEs that contain chipset numbers, for example CVE-2021-41788:
This information is not recorded somewhere else in the CVE (but it is mentioned in some of the references). I know that this isn't specific to a single package or package version, but it is useful information to have nonetheless. Another one would be SDK/BSP: or various keywords, such as UPnP, or program names (for examples of both see CVE-2021-35393 ). I could help assemble lists of keywords that are interesting to me. |
I updated the scripts here to the V5 JSON format. |
Relevant in this context: https://github.com/armijnhemel/devicecode |
We should extract interesting data from CVE and other vulnerabilities body. This is based on this research https://rp.os3.nl/2020-2021/p06/report.pdf and https://rp.os3.nl/2020-2021/p06/presentation.pdf by Bart van Dongen and @armijnhemel
See also for related projects https://rp.os3.nl/2020-2021/index.html
For instance in https://nvd.nist.gov/vuln/detail/CVE-2020-0002 we have a description choke full of unstructured data, with clues of file name, function name and various Android version and Android IDs:
Here for instance we could extract a cross reference between the Android ID and the actual advisory which is in https://source.android.com/security/bulletin/2020-01-01
See also:
The text was updated successfully, but these errors were encountered: