maby什么意思| 身体逐渐消瘦是什么原因| 另煎兑服是什么意思| 什么叫浮小麦| 风云际会的意思是什么| 喝酒头晕是什么原因| 什么的摇动| 清江鱼是什么鱼| 柳暗花明是什么生肖| 雷锋属什么生肖| 称谓是什么意思| 孔子是什么圣人| 中药不能和什么一起吃| 精子有点黄是什么原因| 胎盘低是什么原因造成的| 什么什么之财| 艾滋病挂什么科| 登革热是什么| 帕金森是什么原因引起的| 滋润是什么意思| 尿酸低有什么危害| 瓜子脸配什么发型好看| x线检查是什么| 唐僧成了什么佛| 产假什么时候开始休| 头发长得慢是什么原因| 老花眼有什么症状| o是什么牌子| 雷达是什么| 乳腺增生结节吃什么药效果好| 五月一日是什么节日| 分泌物发黄是什么原因| 手痒是什么原因| 血管是什么颜色的| 今年什么时候过年| 复方氨酚苯海拉明片是什么药| n标志的鞋子是什么牌子| 三教九流代表什么生肖| 国保大队是干什么的| 语感是什么意思| 脖子有痣代表什么意思| 骟是什么意思| 云州是现在的什么地方| 非洲是什么人种| 小腿肿胀是什么原因引起的| 下午六点是什么时辰| 孕妇的尿液有什么用途| 什么虫子咬了像针扎一样疼| cj是什么意思| 海马炖什么好小孩长高| 骨科是什么| homme是什么意思| 何去何从是什么意思| 父亲生日送什么礼物| 净高是什么意思| 锻炼pc肌有什么好处| 做全身检查挂什么科| 胎儿右侧脉络丛囊肿是什么意思| 斤加一笔是什么字| 苏菲是什么| 兔子的眼睛是什么颜色| 扪及是什么意思| 小孩用脚尖走路是什么原因| 卒中中心是什么意思| 肝功七项查的是什么| 维生素e有什么功效| 阴茎不硬吃什么| 益生菌什么时候吃| 性格内敛是什么意思| 胃肠炎可以吃什么水果| 电邮地址是什么| 军分区司令是什么级别| 小猫的尾巴有什么用处| 跳大神什么意思| 检查贫血挂什么科| 观音殿求什么| 什么是三公经费| 洁面液是干什么用的| 什么人不能喝绿豆汤| 一到晚上就饿什么原因| 尿结晶高是什么原因| 许三多最后是什么军衔| 膝盖怕冷是什么原因| 奶水不足吃什么下奶多| 非均匀性脂肪肝是什么意思| 肝风内动吃什么中成药| 蜂窝网络是什么| 鸩是什么意思| 红薯开花预示着什么| 淋巴结节吃什么药| 心肌炎吃什么药效果好| 石英表不走了是什么原因| 双皮奶为什么叫双皮奶| 川芎的功效与作用是什么| 眉骨疼是什么原因| 办银行卡需要什么证件| 血压偏高吃什么药| 微信拥抱表情什么意思| 冰心原名叫什么| 颔是什么意思| 下巴两边长痘痘是什么原因| 盲目是什么意思| 肺结节是什么| 容易淤青的体质叫什么| 小孩睡觉流鼻血是什么原因引起的| 中耳炎用什么药| 烧心是什么症状| 小孩上吐下泻吃什么药| 左耳长痣代表什么| 角的大小与什么有关与什么无关| 爱之深恨之切是什么意思| 角是什么结构| 裳能组什么词| 一惊一乍是什么意思| 香蕉为什么不能放冰箱| 兰陵为什么改名枣庄| 吃中药不能吃什么水果| 心律平又叫什么名字| 梦见抽血是什么预兆| 跑男什么时候播出| 女性生活疼痛什么原因| 膈应是什么意思| 30年的婚姻是什么婚| 新茶是什么意思| 地级市市委书记是什么级别| no2是什么气体| 台湾高山茶属于什么茶| 鸡血藤有什么作用| 后巩膜葡萄肿是什么意思| 今年25岁属什么生肖的| 饿死是什么感觉| 急性肠胃炎可以吃什么水果| 口腔医学是什么| 胆囊结石会引起身体什么症状| 肚子咕噜响是什么原因| 天蝎座什么象星座| 持之以恒是什么意思| 严重脱发是什么原因| 才下眉头却上心头是什么意思| 视频是什么意思| 肉丝炒什么菜好吃| mild是什么意思| 烤冷面的面皮是什么面| 女属羊和什么属相最配| 塑料是用什么做的| 胰岛是什么器官| 老虎菜为什么叫老虎菜| 易蒙停是什么药| 蓝精灵是什么| 血细胞分析能查出什么| 为什么说婴儿摔床没事| 宝宝佛适合什么人戴| 胃火旺怎么调理吃什么药最好| 只是女人容易一往情深是什么歌| 成人发烧吃什么药| 胆囊炎要注意些什么| 黑彩是什么| 女人脚底有痣代表什么| 中国最厉害的武器是什么| 二氧化碳是什么东西| 鸡鸣寺求什么| 生普属于什么茶| eeg是什么意思| 梦见婆婆去世预示什么| 涌泉穴在什么地方| 高山仰止是什么意思| 湿疹什么原因引起的| 月经褐色是什么原因| 农历七月初五是什么星座| 为什么胸闷一吃丹参滴丸就好| 急得什么| 夏天吃羊肉有什么好处| 秦始皇为什么焚书坑儒| 吃柿子有什么好处和坏处| 儿童内热吃什么去内热| 少年郎是什么意思| 小腿细是什么原因| mcu是什么| 除日是什么意思| 什么样的天山| 21.75是什么意思| iu什么意思| 滑膜炎吃什么药| 胃胀胃痛吃什么药| 什么肉是发物| 做流产手术需要准备什么东西| dx是什么药| 10月13号是什么星座| 治飞蚊症用什么眼药水| beryl是什么意思| 儒艮为什么叫美人鱼| 梦见栽树是什么预兆| 什么脸型适合什么发型| 梦到狐狸是什么意思| 梦见屎是什么预兆| 被褥是什么意思| 糖类抗原125偏高是什么原因| 醋泡脚有什么好处和坏处| 查肝胆胰脾肾挂什么科| 腱鞘炎是什么原因引起的| 赊事勿取是什么意思| 什么是螨虫型痘痘图片| 国资委主任是什么级别| 阳痿早泄是什么意思| 大是大非是什么意思| 打闭经针有什么副作用| 眉毛里面有痣代表什么| 血小板低吃什么好| 怀孕什么症状| 胃寒湿气重吃什么药效果最好| 老年人喝什么牛奶好| 脸上长斑的原因是什么引起的| 十一月份是什么星座| 无垢是什么意思| 治疗带状疱疹用什么药最好| 20岁长白头发是什么原因造成的| 雪花飘飘北风萧萧是什么歌| 医院介入科是干什么的| 1997年什么命| 湿疹为什么晚上特别痒| 智齿长什么样子图片| 头发大把大把的掉是什么原因| 手臂发麻是什么原因引起的| 见什么知什么| 脑脊液是什么| 人绒毛膜促性腺激素是什么| 脾肾阳虚吃什么药最好| 什么时机塞给医生红包| 吃大虾不能吃什么| u盘什么牌子好| 乌鱼是什么鱼| 性欲是什么意思| 排卵日是什么时候| 胎盘分级0级什么意思| 为什么不建议治疗幽门螺杆菌| hcg低是什么原因| 爱生气的人容易得什么病| 乳房痛是什么原因| 马马虎虎指什么生肖| 皮肤过敏擦什么药膏好得快| 头疼恶心是什么原因| 身体发抖是什么病| 师傅和师父有什么区别| 吃的少还胖什么原因| 吃什么养肝护肝| 仔字五行属什么| 开火念什么| g18k金是什么意思| 眼睛的睛可以组什么词| 红景天是什么药| 易举易泄是什么原因| 2010年是什么命| 夏天能种什么菜| 喝什么茶降血脂| 什么是慢性萎缩性胃炎| 打完升白针有什么反应| 麻腮风疫苗是预防什么| 尿酸高可以吃什么水果| mrt是什么意思| 卵巢囊肿是什么意思| 面部痉挛是什么原因引起的| 禾真念什么| 扁平疣用什么药| 平痛新又叫什么| 百度Jump to content

2017年自媒体发展的十大趋势 两极分化现象明显

From Wikipedia, the free encyclopedia
百度   NBA总裁萧华自从上任以来一直考虑季后赛改制。

Logo

The Common Vulnerabilities and Exposures (CVE) system, originally Common Vulnerability Enumeration,[1] provides a reference method for publicly known information-security vulnerabilities and exposures.[2] The United States' Homeland Security Systems Engineering and Development Institute FFRDC, operated by The MITRE Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security.[3] The system was officially launched for the public in September 1999.[4]

The Security Content Automation Protocol uses CVE, and CVE IDs are listed on MITRE's system as well as the basis for the US National Vulnerability Database.[5]

CVE identifiers

[edit]

MITRE Corporation's documentation defines CVE Identifiers (also called "CVE names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for publicly known information-security vulnerabilities in publicly released software packages. Historically, CVE identifiers originally had a status of "candidate" ("CAN-") and could then be promoted to entries ("CVE-"), but this practice was ended in 2005[6][7] and all identifiers are now assigned as CVEs. The assignment of a CVE number is not a guarantee that it will become an official CVE entry (e.g., a CVE may be improperly assigned to an issue which is not a security vulnerability, or which duplicates an existing entry). If found not to meet criteria, MITRE or a CVE Numbering Authority (CNA) can summarily place the entry into REJECTED status.

CVEs are assigned by a CVE Numbering Authority (CNA).[8] While some vendors acted as a CNA before, the name and designation was not created until 1 February 2005.[9] There are four primary types of CVE number assignments:

  1. The MITRE Corporation functions as Editor and Primary CNA
  2. Various CNAs assign CVE numbers for their own products (e.g., Microsoft, Oracle, HP, Red Hat)
  3. A third-party coordinator such as CERT Coordination Center may assign CVE numbers for products not covered by other CNAs
  4. Researchers, in one case, have been granted the CNA role.[10]

When investigating a vulnerability or potential vulnerability it helps to acquire a CVE number early on. CVE numbers may not appear in the MITRE or NVD databases for some time (days, weeks, months or potentially years) due to issues that are embargoed (the CVE number has been assigned but the issue has not been made public), or historically in cases where the entry is not researched and written up by MITRE due to resource issues. The benefit of early CVE candidacy is that all future correspondence and coordination can refer to the CVE number to ensure all parties are referring to the same vulnerability. Information on getting CVE identifiers for issues with open source projects is available from Red Hat[11] and GitHub.[12]

CVEs are for software that has been publicly released; this can include betas and other pre-release versions if they are widely used. Commercial software is included in the "publicly released" category, but custom-built software that is not distributed would historically not be given a CVE. For the first two decades of the program, services (e.g., a Web-based email provider) are not assigned CVEs for vulnerabilities found in the service (e.g., an XSS vulnerability) unless the issue exists in an underlying software product that is publicly distributed. Official rules have not been published regarding this change but some CNAs including MITRE have begun assigning CVEs to service-based vulnerabilities as far back as 2000.[13]

CVE data fields

[edit]

The CVE database contains several fields:

Description

[edit]

This is a standardized text description of the issue(s). One common entry is:

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

This means that the entry number has been reserved by Mitre for an issue or a CNA has reserved the number. So when a CNA requests a block of CVE numbers in advance (e.g., Red Hat currently requests CVEs in blocks of 500), the CVE number will be marked as reserved even though the CVE itself may not be assigned by the CNA for some time. Until the CVE is assigned, Mitre is made aware of it (i.e., the embargo passes and the issue is made public), and Mitre has researched the issue and written a description of it, entries will show up as "** RESERVED **".

Record Creation Date

[edit]

This is the date the entry was created. For CVEs assigned directly by Mitre, this is the date Mitre created the CVE entry. For CVEs assigned by CNAs (e.g., Microsoft, Oracle, HP, Red Hat) this is also the date that was created by Mitre, not by the CNA. When a CNA requests a block of CVE numbers in advance (e.g., Red Hat currently requests CVEs in blocks of 500) the entry date that CVE is assigned to the CNA.

Obsolete fields

[edit]

The following fields were previously used in CVE records, but are no longer used.

  • Phase: The phase the CVE is in (e.g., CAN, CVE).
  • Votes: Previously board members would vote yea or nay on whether or not the CAN should be accepted and turned into a CVE.
  • Comments: Comments on the issue.
  • Proposed: When the issue was first proposed.

Changes to syntax

[edit]

In order to support CVE IDs beyond CVE-YEAR-9999 (an issue known as the 'CVE10k problem'[14]) a change was made to the CVE syntax in 2014 and took effect on 13 January 2015.[15]

The new CVE-ID syntax is variable length and includes:

CVE prefix + Year + Arbitrary Digits

The variable-length arbitrary digits begin at four fixed digits and expand with arbitrary digits only when needed in a calendar year; for example, CVE-YYYY-NNNN and if needed CVE-YYYY-NNNNN, CVE-YYYY-NNNNNN, and so on. The schema is compatible with previously assigned CVE-IDs, which all include a minimum of four digits.

CVE SPLIT and MERGE

[edit]

CVE attempts to assign one CVE per security issue; however, in many cases this would lead to an extremely large number of CVEs (e.g., where several dozen cross-site scripting vulnerabilities are found in a PHP application due to lack of use of htmlspecialchars() or the insecure creation of files in /tmp).[16]

To deal with this, guidelines (subject to change) cover the splitting and merging of issues into distinct CVE numbers. As a general guideline, one should first consider issues to be merged, then issues should be split by the type of vulnerability (e.g., buffer overflow vs. stack overflow), then by the software version affected (e.g., if one issue affects version 1.3.4 through 2.5.4 and the other affects 1.3.4 through 2.5.8 they would be SPLIT) and then by the reporter of the issue (e.g., if Alice reports one issue and Bob reports another issue, the issues would be SPLIT into separate CVE numbers).[16]

Another example is Alice reports a /tmp file creation vulnerability in version 1.2.3 and earlier of ExampleSoft web browser; in addition to this issue, several other /tmp file creation issues are found. In some cases this may be considered as two reporters (and thus SPLIT into two separate CVEs, or if Alice works for ExampleSoft and an ExampleSoft internal team finds the rest it may be MERGE'ed into a single CVE). Conversely, issues can be merged, such as if Bob finds 145 XSS vulnerabilities in ExamplePlugin for ExampleFrameWork regardless of the versions affected and so on, they may be merged into a single CVE.[16]

Search CVE identifiers

[edit]

The Mitre CVE database can be searched at the CVE List Search, and the NVD CVE database can be searched at Search CVE and CCE Vulnerability Database.

CVE usage

[edit]

CVE identifiers are intended for use with respect to identifying vulnerabilities:

Common Vulnerabilities and Exposures (CVE) is a dictionary of common names (i.e., CVE Identifiers) for publicly known information security vulnerabilities. CVE's common identifiers make it easier to share data across separate network security databases and tools, and provide a baseline for evaluating the coverage of an organization's security tools. If a report from one of your security tools incorporates CVE Identifiers, you may then quickly and accurately access fix information in one or more separate CVE-compatible databases to remediate the problem.[17]

Users who have been assigned a CVE identifier for a vulnerability are encouraged to ensure that they place the identifier in any related security reports, web pages, emails, and so on.

CVE assignment issues

[edit]

Per section 7 of the CNA Rules, a vendor which received a report about a security vulnerability has full discretion in regards to it.[18] This can lead to a conflict of interest as a vendor may attempt to leave flaws unpatched by denying a CVE assignment at first place – a decision which Mitre can't reverse. The "!CVE" (not CVE) project, announced in 2023, aims to collect vulnerabilities that are denied by vendors, so long as they are considered valid by a panel of experts from the project.[19]

CVE identifiers have been awarded for bogus issues and issues without security consequences.[20] In response, a number of open-source projects have themselves applied to become the CVE Numbering Authority (CNA) of their own project.[21]

2025 funding issues

[edit]

On 15 April 2025, it was reported that the contract between MITRE and the US government, set to expire the day after,[22] would expire. Reports stated that the expiration of the contract would bring an end to the operational arm of the CVE program, including assigning new CVEs, while the database would remain accessible via GitHub.[23]

Just prior to its expiration, the contract was extended for 11 months, averting the shutdown of the program.[24]

See also

[edit]

References

[edit]
  1. ^ "CVE - Towards a Common Enumeration of Vulnerabilities". 18 April 2025. Archived from the original on 18 April 2025. Retrieved 29 April 2025.
  2. ^ Wu, Xiaoxue; Zheng, Wei; Chen, Xiang; Wang, Fang; Mu, Dejun (2020). "CVE-assisted large-scale security bug report dataset construction method". Journal of Systems and Software. 160 110456. doi:10.1016/j.jss.2019.110456. S2CID 209056007.
  3. ^ "CVE – Common Vulnerabilities and Exposures". Mitre Corporation. 3 July 2007. Retrieved 18 June 2009. CVE is sponsored by the National Cyber Security Division of the U.S. Department of Homeland Security.
  4. ^ "CVE - History". cve.mitre.org. Retrieved 25 March 2020.
  5. ^ "CVE - Common Vulnerabilities and Exposures (CVE)". cve.mitre.org. Archived from the original on 7 April 2013. Retrieved 8 April 2013.
  6. ^ "CVE - Frequently Asked Questions". cve.mitre.org. Retrieved 1 September 2021.
  7. ^ Kouns, Jake (13 August 2009). "Reviewing(4) CVE". OSVDB: Everything is Vulnerable. Archived from the original on 1 September 2021. Retrieved 1 September 2021.
  8. ^ "CVE - CVE Numbering Authorities". MITRE Corporation. 1 February 2015. Retrieved 5 March 2024.
  9. ^ "CVE - CVE Blog "Our CVE Story: Ancient History of the CVE Program – Did the Microsoft Security Response Center have Precognition?" (guest author)". cve.mitre.org. Retrieved 17 September 2021.
  10. ^ "CVE - CVE Blog "My CVE Story: How I Became the CVE Program's First Vulnerability Researcher CNA" (guest author)". 15 March 2021. Archived from the original on 15 March 2021. Retrieved 29 April 2025.
  11. ^ "CVE OpenSource Request HOWTO". Red Hat Inc. 14 November 2016. Retrieved 29 May 2019. There are several ways to make a request depending on what your requirements are:
  12. ^ "About GitHub Security Advisories". GitHub. Retrieved 23 December 2021. GitHub Security Advisories builds upon the foundation of the Common Vulnerabilities and Exposures (CVE) list
  13. ^ "CVE - CVE-2000-0081". 4 December 2021. Archived from the original on 4 December 2021. Retrieved 29 April 2025.
  14. ^ Christey, Steven M. (12 January 2007). "CVE - The CVE-10K Problem". cve.mitre.org. The MITRE Corporation. Retrieved 25 November 2023.
  15. ^ "CVE - CVE ID Syntax Change". cve.mitre.org. 13 September 2016.
  16. ^ a b c "CVE Abstraction Content Decisions: Rationale and Application (Archived)". The Mitre Corporation. 15 June 2005. Retrieved 6 January 2024.
  17. ^ "CVE - About CVE". cve.mitre.org. Retrieved 28 July 2015.
  18. ^ "CVE Numbering Authority Rules - Assignment Rules" (PDF). The MITRE Corporation. 1 February 2020. pp. 13–15. Retrieved 6 December 2023.
  19. ^ Edge, Jake (5 December 2023). "Supplementing CVEs with !CVEs". lwn.net.
  20. ^ Edge, Jake (13 September 2023). "The bogus CVE problem". lwn.net.
  21. ^ "A turning point for CVE numbers". LWN.net. 14 February 2024.
  22. ^ "CONTRACT to THE MITRE CORPORATION". www.usaspending.gov. Retrieved 16 April 2025.
  23. ^ Bradley, Tony. "Cybersecurity World On Edge As CVE Program Prepares To Go Dark". Forbes. Retrieved 16 April 2025.
  24. ^ Brunfield, Cynthia (16 April 2025). "CVE program averts swift end after CISA executes 11-month contract extension". CSO Online. IDG Communications. Retrieved 16 April 2025.
[edit]
额头上长小疙瘩是什么原因 上曼月乐环后要注意什么 原汤化原食什么意思 澳门为什么叫澳门 微信头像用什么好
手指关节痛是什么原因 今天立冬吃什么 右腿麻木是什么征兆 臭鱼烂虾什么意思 91是什么意思
牙医需要什么学历 受控是什么意思 4.8什么星座 hpv疫苗是什么 六月十七是什么星座
为什么没有西京 探病是什么意思 生粉和淀粉有什么区别 声音嘶哑是什么原因 和平是什么意思
后脑勺麻木是什么征兆hcv8jop8ns1r.cn 手癣用什么药膏hcv9jop3ns8r.cn 缺维生素b吃什么食物wmyky.com 依托是什么意思baiqunet.com 又吐又拉是什么原因hcv9jop0ns2r.cn
煮玉米为什么要放盐hcv9jop4ns1r.cn 韭菜炒什么好吃luyiluode.com 银耳不能和什么一起吃hcv8jop4ns8r.cn 甲辰年五行属什么tiangongnft.com 韧带损伤挂什么科hcv7jop5ns5r.cn
淋巴结看什么科hcv8jop8ns9r.cn 今天是什么纪念日cl108k.com 腰椎挂什么科室gangsutong.com 菩提根是什么hcv8jop8ns3r.cn pci是什么意思hcv7jop7ns1r.cn
治疗狐臭挂什么科hcv7jop9ns4r.cn 排卵期同房要注意什么hcv8jop8ns5r.cn 59岁生日有什么讲究hcv9jop3ns7r.cn 心衰竭是什么病严重吗hcv7jop6ns9r.cn 为什么老是犯困想睡觉hcv7jop7ns1r.cn
百度