This docker application provides the list of CVE (Common Vulnerabilities and Exploits) for all DeviceHub devices added to Litmus Edge. This CVE data comes from the from the National Vulnerabilities Database (NVD)/NIST/ Mitre database, and the search done for each device is based on the device meta tags of name, version and firmware version
Example Use Case
A device has the meta tag "name: Siemens". This app will index its database (obtained from National Vulnerabilities Database) and find all possible matches to the words "siemens" for any CVEs related to that search term
Common Vulnerabilities and exploits (CVE) advisories docker app connects to the National Vulnerabilities Database and/or Mitre, and aggregates all the CVE data into one local database
Next, the app connects to LitmusEdge DeviceHub via Rest API calls, and "looks" for keywords in the Meta Tag field of all devices. If the particular Meta Tag is currently supported, the app searches the local database to find any possible matches. This is using a SQL "like" operator, so 100% accuracy should never be expected
Currently supported search terms in the Meta Tag of a device are "name", "version" and "firmware_version"