From the course: Cybersecurity at Work

Unlock the full course today

Join today to access over 24,100 courses taught by industry experts.

Common vulnerabilities and exposures (CVE)

Common vulnerabilities and exposures (CVE)

From the course: Cybersecurity at Work

Common vulnerabilities and exposures (CVE)

- We know that software is vulnerable, but many don't realize that the specific security vulnerabilities are actually public knowledge. There's a list of more than 100,000 publicly known vulnerabilities. This list is called CVE which stands for Common Vulnerabilities and Exposures. CVE provides identifiers and standard descriptions for vulnerabilities. It is used by many different security services, tools and databases. Software organizations use CVE to stay up to date on new vulnerabilities and their fixes. At the same time hackers can use CVE to find vulnerabilities that don't get addressed and exploit them often by using malware such as ransomware. Software changes and when security vulnerabilities are identified, patches are released and software updates are made available. Users who do not update their software will be vulnerable to hackers who choose to exploit those vulnerabilities for malicious purposes.

Contents