IDENTIFYING AND ADDRESSING POTENTIAL VULNERABILITIES IN THIRD-PARTY CODE

Number of patents in Portfolio can not be more than 2000

United States of America

APP PUB NO 20240411897A1
SERIAL NO

18740976

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

In some examples, a server receives a security advisory that includes a description of a vulnerability and accesses a version control system (VCS) used by a third-party library to determine additional resources related to the vulnerability. The server determines a set of code changes performed by the project maintainers in the VCS, identifies one or more fix commits that address the vulnerability, and identifies one or more functions with the vulnerability that have been changed by the fix commits. The server performs a search for components and component versions that include the one or more functions with the vulnerability and generates an enriched vulnerability description that includes identifiers of package versions that include fixed versions of the one or more functions and vulnerable version of the one or more functions. Project code in a development system is modified to use the fixed versions of the one or more functions.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddress
ENDOR LABS INC125 UNIVERSITY AVE #88 PALO ALTO CA 94301

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
PLATE, Henrik Valbonne, FR 17 249
STYLIADIS, Dimitrios San Jose, US 2 0
WILHELM, Alexandre Kilauea, US 1 0

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation