Open Interchange on CPE - Purl Between Communities of Interest and the CVE and NVD Programs

CVE/FIRST VulnCon 2025 · Main Stage

This VulnCon session delves into the intricate challenges of software identification within the vulnerability management ecosystem, focusing on the interplay between **Common Platform Enumeration (CPE)** and **Package URL (PURL)**. Facilitated by Pete and Chris, the discussion brings together experts from various organizations, including Red Hat, MongoDB, Cisco, Oracle, and MITRE, to explore how these identifiers can be better utilized and integrated into the **CVE (Common Vulnerabilities and Exposures)** and **NVD (National Vulnerability Database)** programs. The core problem addressed is the pervasive difficulty faced by data consumers—such as security scanners and end-users—in accurately identifying vulnerable software components and understanding the applicability of CVEs to their specific environments.

AI review

A substantive community working session on a genuinely important and underappreciated problem — software identification fragmentation in the CVE/NVD ecosystem. The right people are in the room: CVE board members, CNA representatives from Red Hat, MongoDB, Cisco, Oracle, a CVSS co-creator. The problems they're diagnosing are real, consequential, and not widely understood outside the vulnerability management community. CPE's inadequacy, NVD's backlog, the backporting mess, VEX adoption gaps — this is the unglamorous plumbing work that determines whether every security scanner on the planet…

Watch on YouTube