From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Common vulnerabilities and exposures
From the course: Ethical Hacking: Vulnerability Analysis
Common vulnerabilities and exposures
The Common Vulnerabilities and Exposures is the go-to resource for security professionals. The C-V-E is an extensive list of entries that provides detailed information on known vulnerabilities. Each C-V-E has an identification number, a score, and additional information. The score is derived from a set of metrics using the Common Vulnerabilities Scoring System, an industry standard that rates the severity of vulnerabilities. The C-V-E is used in many places, such as intrusion detection systems, firewalls, and security advisories, and it feeds into the National Vulnerability Database. I'm here at this website. I did a search on S-Q-L injection. This is a common vulnerability, and it's where an attacker spoofs a data-driven application by injecting string values into a form field in order to expose the database contents. So here you can see all of the different entries in here. And we'll scroll down, and as you can see,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Common Vulnerability Scoring System5m 10s
-
(Locked)
Common vulnerabilities and exposures3m 36s
-
(Locked)
Outsourcing vulnerability analysis2m 41s
-
(Locked)
Bug bounty white hat hacking3m 19s
-
(Locked)
Challenge: The Temporal metric group (new)1m 36s
-
(Locked)
Solution: The Temporal metric group (new)3m
-
-
-
-