1,891 views
► My Python book https://amzn.to/3ARMbw8 (*) ► Hacking with Python https://amzn.to/3pxVnmh (*) (*) The Amazon links (https.//amzn.to/???????) are affiliate links. If you buy something through this link, I get a small commission. The price does not change if you buy through this link. Thank you for your support. Contents ???? CVE stands for Common Vulnerabilities and Exposures and is a widely used system for identifying and cataloging security vulnerabilities in software and hardware. The CVE initiative was launched in 1999 by the MITRE Corporation. The aim of the CVE system is to provide a standardized method for naming and describing security vulnerabilities in order to facilitate collaboration and information exchange between different security solutions and experts. CVE plays a central role in the field of ethical hacking. Security researchers and ethical hackers use CVE entries to identify and fix known vulnerabilities in systems. This is critical to ensure the integrity, confidentiality and availability of data and systems. By understanding and using CVE data, ethical hackers can proactively uncover security vulnerabilities and develop countermeasures before malicious actors can exploit those vulnerabilities. #cve #cvss #itsecurity 00:00 What is CVE? 01:31 Building a CVE vector 05:00 Challenge SOCIAL MEDIA ???? Website: https://www.florian-dalwigk.de ???? TikTok: / florian.dalwigk ???? Instagram: / florian.dalwigk ???? Twitter: / florian_dalwigk ???? E-Mail: mailto:[email protected]