September 2018
Intermediate to advanced
426 pages
10h 46m
English
The vulnerabilities are uniquely identified by the CVE (Common Vulnerabilities and Exposures) code, which was created by MITRE Corporation. This code allows a user to understand in a more objective way a vulnerability in a program or system.
The identifier code has the format CVE - year - number mode; for example CVE-2018-7889 identifies a vulnerability discovered in 2018 with identifier 7889. There are several databases in which you can find information about the different existing vulnerabilities, such as:
Usually, the published vulnerabilities ...