Solved

cwe / cve

Posted on 2010-08-22
1
1,132 Views
Last Modified: 2012-05-10
Can anyone give me a heads up on the difference between a "CVE vulnerability" and a "CWE vulnerability", with some practical examples? Are CVE's stuff like Nessus checks for and CWE those found during manual security reviews?
0
Comment
Question by:pma111
1 Comment
 
LVL 19

Accepted Solution

by:
CoccoBill earned 250 total points
ID: 33498544
Common Weakness Enumeration is a list of different software weakness types: http://cwe.mitre.org/about/index.html

Common Vulnerabilities and Exposures is a list of publicly known information security vulnerabilities and exposures: http://cve.mitre.org/cve/identifiers/index.html

CWE lists the potential weaknesses, while CVE lists the actual vulnerabilities affecting them.
0

Featured Post

New! My Passport Wireless Pro Wi-Fi Mobile Storage

Portable wireless storage to offload, edit, and stream anywhere.

High-capacity, wireless mobile storage designed to accompany professional photographers and videographers in the field to easily offload, edit and stream captured photos and high-definition videos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now