Solved

cwe / cve

Posted on 2010-08-22
1
1,217 Views
Last Modified: 2012-05-10
Can anyone give me a heads up on the difference between a "CVE vulnerability" and a "CWE vulnerability", with some practical examples? Are CVE's stuff like Nessus checks for and CWE those found during manual security reviews?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 19

Accepted Solution

by:
CoccoBill earned 250 total points
ID: 33498544
Common Weakness Enumeration is a list of different software weakness types: http://cwe.mitre.org/about/index.html

Common Vulnerabilities and Exposures is a list of publicly known information security vulnerabilities and exposures: http://cve.mitre.org/cve/identifiers/index.html

CWE lists the potential weaknesses, while CVE lists the actual vulnerabilities affecting them.
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question