Vulnerabilities format

The vulnerabilities are uniquely identified by the CVE (Common Vulnerabilities and Exposures) code, which was created by MITRE Corporation. This code allows a user to understand in a more objective way a vulnerability in a program or system.

The identifier code has the format CVE - year - number mode; for example CVE-2018-7889 identifies a vulnerability discovered in 2018 with identifier 7889. There are several databases in which you can find information about the different existing vulnerabilities, such as:

Usually, the published vulnerabilities ...

Get Mastering Python for Networking and Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.