Solved

cwe / cve

Posted on 2010-08-22
1
1,156 Views
Last Modified: 2012-05-10
Can anyone give me a heads up on the difference between a "CVE vulnerability" and a "CWE vulnerability", with some practical examples? Are CVE's stuff like Nessus checks for and CWE those found during manual security reviews?
0
Comment
Question by:pma111
1 Comment
 
LVL 19

Accepted Solution

by:
CoccoBill earned 250 total points
ID: 33498544
Common Weakness Enumeration is a list of different software weakness types: http://cwe.mitre.org/about/index.html

Common Vulnerabilities and Exposures is a list of publicly known information security vulnerabilities and exposures: http://cve.mitre.org/cve/identifiers/index.html

CWE lists the potential weaknesses, while CVE lists the actual vulnerabilities affecting them.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question