The chat responses are generated using Generative AI technology for intuitive search and may not be entirely accurate. They are not intended as professional advice. For full details, including our use rights, privacy practices and potential export control restrictions, please refer to our Generative AI Service Privacy Information. As this is a test version, please let us know if something irritating comes up. Like you get recommended a chocolate fudge ice cream instead of an energy managing application. If that occurs, please use the feedback button in our contact form!
Skip to content

Glossary

Definitions and abbreviations in the context of the Vilocify service

TermDescription
AdvisoryVendor published statement on a validated vulnerability and instructions how to handle this issue.
ComponentSee description of component.
COTSCommercial off-the-shelf: Components / products sold ready to use. These components aren't customized.
CPECommon Platform Enumeration: structured naming scheme for IT components provided by NIST National Vulnerability Database (NVD)
CVECommon Vulnerabilities and Exposures: a unique, alphanumeric identifier assigned by the CVE Program, referencing a specific vulnerability
CVE completenessSee description of notification
CVSSCommon Vulnerability Scoring System is an open framework for communicating the characteristics and severity of vulnerabilities.
EOLEnd of Life date, see description of component.
EUVD completenessSee description of notification
Monitoring ListSee description of monitoring list.
Monitoring List OwnerSubscribers of a monitoring list who have the permission to modify the list. In particular, adding or removing subscribers, adding or removing components, editing its basic data, or deleting the list entirely.
Monitoring List SubscriberUser assigned to a monitoring list and will therefore receive notifications emails containing relevant notifications.
NotificationSee description of notification.
Notifications EmailSee description of notifications email.
OSSOpen-source software: Software (components) from source code that's free available, but not always for free.
Security NotificationSee description of notification.
VilocifyVulnerability Intelligence Service
VulnerabilityWeakness of an component (or product) that can be exploited by an attacker