Kocaman, YusufGönen, SerkanBarişkan, Mehmet AliKaracayilmaz, GökçeYilmaz, Ercan Nurcan2024-09-112024-09-1120222511-2104https://doi.org/10.1007/s41870-021-00840-6https://hdl.handle.net/11363/8535Advances in information and technology have provided great opportunities and conveniences for human life. However, with this process, attackers have switched to cyberspace due to various factors such as anonymity, easy attack tools, and non-deterrent penalties. For this reason, various methods have been developed to protect systems from cyber-attacks. One of the most important methods is the continuity-based vulnerability analysis of the systems and the network created by the systems, even for emerging threats. In this study, the current and comprehensive list of vulnerabilities created by combining the data obtained from different CVE sources is compared with the packages on the operating system. In this way, it is possible to obtain information about the system’s current openness status and take precautions. The analyzes have been carried out on Ubuntu operating system; however, the study can be adapted to other operating systems and larger systems by following the implementation phases of the proposed method. © 2022, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.eninfo:eu-repo/semantics/closedAccessCVE; Cyber security; Security analysis; Vulnerability assessment; Vulnerability databaseA novel approach to continuous CVE analysis on enterprise operating systems for system vulnerability assessmentArticle1431433144310.1007/s41870-021-00840-62-s2.0-85124413361Q2