From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Common vulnerabilities and exposures

Common vulnerabilities and exposures

From the course: Ethical Hacking: Vulnerability Analysis

Start my 1-month free trial

Common vulnerabilities and exposures

The Common Vulnerabilities and Exposures is the go-to resource for security professionals. The C-V-E is an extensive list of entries that provides detailed information on known vulnerabilities. Each C-V-E has an identification number, a score, and additional information. The score is derived from a set of metrics using the Common Vulnerabilities Scoring System, an industry standard that rates the severity of vulnerabilities. The C-V-E is used in many places, such as intrusion detection systems, firewalls, and security advisories, and it feeds into the National Vulnerability Database. I'm here at this website. I did a search on S-Q-L injection. This is a common vulnerability, and it's where an attacker spoofs a data-driven application by injecting string values into a form field in order to expose the database contents. So here you can see all of the different entries in here. And we'll scroll down, and as you can see,…

Contents