Ä«Å×°í¸®º° ÇÏÀ§¸Þ´º·Î ¹Ù·Î°¡±â
º»¹®À¸·Î ¹Ù·Î°¡±â
Çϴܸ޴º·Î ¹Ù·Î°¡±â
»çÀÌÆ®¸ÊÀ¸·Î ¹Ù·Î°¡±â
Ä«Å×°í¸®º° ÇÏÀ§¸Þ´º
º»¹® ½ÃÀÛ
Ȩ
> Ç¥ÁØÈ Âü¿© >
Á¦¾È¼³»¿ë
Ç¥ ÁØ
Á¦¾È¹øÈ£
2026-P0810
Á¦¾ÈÇ¥Áظí
±¹¹® :Software Identification (SWID) Tags ±â¹Ý ¾ÈÀüÇϰí È¿À²ÀûÀÎ º¸¾ÈÃë¾àÁ¡ °ü¸®¸¦ À§ÇÑ VEX(Vulnerability Exploitability eXchange) Ȱ¿ë Áöħ
¿µ¹® :VEX(Vulnerability Exploitability eXchange) Utilization Guidelines for Safe and Efficient Open Source Management Based on Software Identification (SWID) Tags
Á¦Á¤/°³Á¤/ÆóÁö ±¸ºÐ
Á¦Á¤
Á¦¾È´Üü ¶Ç´Â
°³ÀÎ ¸íĪ
Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿ø(¹Ú¼ö¸í), PG602
¿¬¶ô Ã¥ÀÓÀÚ
¹Ú¼ö¸í
½ÅûÀÏ
2026-04-21
÷ºÎÆÄÀÏ
TTAK.KO-11.0xxx_R1 (½Å±Ô Á¦¾È - SWID±â¹Ý ¾ÈÀüÇϰí È¿À²ÀûÀÎ º¸¾ÈÃë¾àÁ¡ °ü¸®¸¦ À§ÇÑ VEX Ȱ¿ë Áöħ).docx
¼³¸í¼
¸ñ ·Ï