<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Common Vulnerabilities and Exposures (CVE) in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21615#M1195</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/637665353"&gt;@iluom&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone help me how to use Common Vulnerabilities and Exposures (CVE) – A dictionary of publicly known information security vulnerabilities and exposures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Mouli,&lt;/P&gt;&lt;P&gt;Start your research on use of CVE's at the primary home site, maintained by the company that developed them&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="http://cve.mitre.org" target="_blank" rel="noopener"&gt;http://cve.mitre.org&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MITRE started the CVE program to reconcile the confusion over multiple common names for the same vulnerability or virus. Over teh years it has become adopted by most security analysis companies, and also by governments, such as the U.S. &lt;STRONG&gt;&lt;A href="https://nvd.nist.gov" target="_blank" rel="noopener"&gt;National Vulnerability Database&lt;/A&gt;&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See &amp;nbsp;the explanation of the relationships between them at&lt;/P&gt;&lt;P&gt;&lt;A href="http://cve.mitre.org/about/cve_and_nvd_relationship.html" target="_blank" rel="noopener"&gt;http://cve.mitre.org/about/cve_and_nvd_relationship.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are several ways to use the CVE codes. If your security scanner identifies problems with a system by giving the CVE #, you can go to the CVE and NVD sites to learn more details about precisely what the vulnerability is, and how to remediate it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, security researchers who think they have identified a new vulnerability in a system or program can research the NVD to see if it has already been identified and cataloged, or if they might submit it as a new potential CVE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you learn about CVE details, I recommend you also research the U. S. NIST &lt;STRONG&gt;&lt;A href="https://csrc.nist.gov/projects/security-content-automation-protocol/" target="_blank" rel="noopener"&gt;Security Content Automation Protocol (SCAP)&lt;/A&gt;&lt;/STRONG&gt; which leverages the CVE registrations, too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(While I did not work on the CVE or the broader CxE enumeration projects at MITRE, I did work closely with several of the key researchers in those projects. Excellent work and darn smart folks!)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2019 16:43:20 GMT</pubDate>
    <dc:creator>CraginS</dc:creator>
    <dc:date>2019-04-26T16:43:20Z</dc:date>
    <item>
      <title>Common Vulnerabilities and Exposures (CVE)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21587#M1189</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone help me how to use Common Vulnerabilities and Exposures (CVE) – A dictionary of publicly known information security vulnerabilities and exposures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I heard&amp;nbsp;CVE Entries are used in numerous cybersecurity products and services&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to explore/refer this list for my secure software development activities but it looks very huge and don't know where to start and how leverage for my needs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 01:44:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21587#M1189</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-04-26T01:44:50Z</dc:date>
    </item>
    <item>
      <title>Re: Common Vulnerabilities and Exposures (CVE)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21594#M1190</link>
      <description>&lt;P&gt;Hi, in layman terms, CVEs are the code numbers assigned to the vulnerabilities that can exist in any system, hardware or a software. To work with it I would recommend to have a vulnerability scanner may it be a SAST or a DAST for devops. The Vuln scanner will help u identify the vulnerabilities with references to their related CVEs that contain a detailed explanation related to that specific vuln along with its remediation steps. You must have a vulnerability management program that will articulate the whole process and vuln management lifecycle. This is what I would propose in simple terms. Best of luck&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Fri, 26 Apr 2019 07:03:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21594#M1190</guid>
      <dc:creator>chzia</dc:creator>
      <dc:date>2019-04-26T07:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: Common Vulnerabilities and Exposures (CVE)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21599#M1191</link>
      <description>&lt;P&gt;Hi Zia,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your worthy suggestion and it helps to proceed further.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 07:40:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21599#M1191</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-04-26T07:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Common Vulnerabilities and Exposures (CVE)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21603#M1192</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The vulnerability scanners I've worked with usually give you a CVE number along with what they detect --- while they also provide the recommendations to mitigate the vulnerabilities, if your teams want more info about his you can do a search on sites such as &lt;A href="https://cve.mitre.org/" target="_blank" rel="noopener"&gt;CVE&lt;/A&gt;; in most cases, they point you to the vendor / community websites for more details on the requirements / impacts, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, entities that provide alerts tend to include the CVE numbers with these, and one source you can avail of for alerts itself if you're a member of (ISC)2 is &lt;A href="https://vulnerability.isc2.org/" target="_blank" rel="noopener"&gt;Vulnerability Central&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 08:28:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21603#M1192</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-04-26T08:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: Common Vulnerabilities and Exposures (CVE)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21615#M1195</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/637665353"&gt;@iluom&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone help me how to use Common Vulnerabilities and Exposures (CVE) – A dictionary of publicly known information security vulnerabilities and exposures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Mouli,&lt;/P&gt;&lt;P&gt;Start your research on use of CVE's at the primary home site, maintained by the company that developed them&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="http://cve.mitre.org" target="_blank" rel="noopener"&gt;http://cve.mitre.org&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MITRE started the CVE program to reconcile the confusion over multiple common names for the same vulnerability or virus. Over teh years it has become adopted by most security analysis companies, and also by governments, such as the U.S. &lt;STRONG&gt;&lt;A href="https://nvd.nist.gov" target="_blank" rel="noopener"&gt;National Vulnerability Database&lt;/A&gt;&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See &amp;nbsp;the explanation of the relationships between them at&lt;/P&gt;&lt;P&gt;&lt;A href="http://cve.mitre.org/about/cve_and_nvd_relationship.html" target="_blank" rel="noopener"&gt;http://cve.mitre.org/about/cve_and_nvd_relationship.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are several ways to use the CVE codes. If your security scanner identifies problems with a system by giving the CVE #, you can go to the CVE and NVD sites to learn more details about precisely what the vulnerability is, and how to remediate it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, security researchers who think they have identified a new vulnerability in a system or program can research the NVD to see if it has already been identified and cataloged, or if they might submit it as a new potential CVE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you learn about CVE details, I recommend you also research the U. S. NIST &lt;STRONG&gt;&lt;A href="https://csrc.nist.gov/projects/security-content-automation-protocol/" target="_blank" rel="noopener"&gt;Security Content Automation Protocol (SCAP)&lt;/A&gt;&lt;/STRONG&gt; which leverages the CVE registrations, too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(While I did not work on the CVE or the broader CxE enumeration projects at MITRE, I did work closely with several of the key researchers in those projects. Excellent work and darn smart folks!)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 16:43:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21615#M1195</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-04-26T16:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Common Vulnerabilities and Exposures (CVE)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21619#M1197</link>
      <description>Excellent ! great info.</description>
      <pubDate>Fri, 26 Apr 2019 17:36:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Common-Vulnerabilities-and-Exposures-CVE/m-p/21619#M1197</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-04-26T17:36:47Z</dc:date>
    </item>
  </channel>
</rss>

