- Published: September 15, 2022
- Updated: September 15, 2022
- University / College: University of Bath
- Level: Secondary School
- Language: English
- Downloads: 28
College: Computer Security What is the basic purpose behind the CVE? The main purpose of the Common Vulnerabilities and Exposures site is to provide a platform that provides synchronized information on all vulnerabilities in the information security sector. Its goal is to make it easy to share information on these vulnerability capabilities. This would involve giving common names to problems in the public domain including vulnerability repositories, tools, and services.
Describe the convention used for the identifiers of the CVE reports found on the site.
Identifiers for CVE reports are unique identities that are allocated to publicly known vulnerabilities to information security. Each identifier, therefore, represents a single vulnerability. The CVE numbering authority assigns a CVE Identifier Number to information on the potential exposure or security vulnerability as soon as it becomes available to the public. Vulnerabilities can, therefore, be distinguished from each other using these identifiers (Common Vulnerabilities and Exposures).
About how many CVE entries are currently in their database (as of 09/10/12)?
The database at CVE currently has about 58345 entries.
Approximately how many of these involve a ” buffer overflow”?
8159 entries include a buffer overflow
How many of all the CVE entries mention Internet Explorer?
1243 entries mention Microsoft Window’s ‘ Internet Explorer’ web browser in their data.
How many mention SQL?
The number of entries that mention SQL in the CVE database is approximately 20822.
Works Cited
Common Vulnerabilities and Exposures. Frequently Asked Questions, 5 July 2012. Web. 16 Sept 2012.