When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Common Vulnerabilities and Exposures - Wikipedia

    en.wikipedia.org/wiki/Common_Vulnerabilities_and...

    Logo. The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures. [1] The United States' National Cybersecurity FFRDC, operated by The MITRE Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security. [2]

  3. Common Attack Pattern Enumeration and Classification

    en.wikipedia.org/wiki/Common_Attack_Pattern...

    The Common Attack Pattern Enumeration and Classification or CAPEC is a catalog of known cyber security attack patterns [1] to be used by cyber security professionals to prevent attacks. [ 2 ]

  4. National Vulnerability Database - Wikipedia

    en.wikipedia.org/wiki/National_Vulnerability...

    In addition to providing a list of Common Vulnerabilities and Exposures (CVEs), the NVD scores vulnerabilities using the Common Vulnerability Scoring System (CVSS) [4] which is based on a set of equations using metrics such as access complexity and availability of a remedy. [5]

  5. Vulnerability (computer security) - Wikipedia

    en.wikipedia.org/wiki/Vulnerability_(computer...

    Vulnerabilities can be scored for risk according to the Common Vulnerability Scoring System or other systems, and added to vulnerability databases. As of November 2024, there are more than 240,000 vulnerabilities [1] catalogued in the Common Vulnerabilities and Exposures (CVE) database.

  6. Common Weakness Enumeration - Wikipedia

    en.wikipedia.org/wiki/Common_Weakness_Enumeration

    Common Weakness Enumeration (CWE) logo. The Common Weakness Enumeration (CWE) is a category system for hardware and software weaknesses and vulnerabilities.It is sustained by a community project with the goals of understanding flaws in software and hardware and creating automated tools that can be used to identify, fix, and prevent those flaws. [1]

  7. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown was issued a Common Vulnerabilities and Exposures ID of CVE-2017-5754, also known as Rogue Data Cache Load (RDCL), [3] in January 2018. It was disclosed in conjunction with another exploit, Spectre, with which it shares some characteristics. The Meltdown and Spectre vulnerabilities are considered "catastrophic" by security analysts.

  8. Vulnerability database - Wikipedia

    en.wikipedia.org/wiki/Vulnerability_database

    A vulnerability database (VDB) is a platform aimed at collecting, maintaining, and disseminating information about discovered computer security vulnerabilities.The database will customarily describe the identified vulnerability, assess the potential impact on affected systems, and any workarounds or updates to mitigate the issue.

  9. Heartbleed - Wikipedia

    en.wikipedia.org/wiki/Heartbleed

    The vulnerability was classified as a buffer over-read, [7] a situation where more data can be read than should be allowed. [8] Heartbleed was registered in the Common Vulnerabilities and Exposures database as CVE-2014-0160. [7] The federal Canadian Cyber Incident Response Centre issued a security bulletin advising system administrators about ...