Cyber With KT
search
⌘Ctrlk
Cyber With KT
  • user-helmet-safetyAbout Me
  • 🗃️Courses
    • TCM
      • Practical Ethical Hacking (TCM)
      • Practical Security Fundamentals
        • 1. Security Basics
        • 2. Intro to the Blue Team
        • 3. Intro to the Red Team
        • 4. Defensive Tooling
        • 5. Vulnerabilities and Exploits
          • Vulnerabilities Vs Exploits
          • 🖥️Exploit Lab
          • CVE, CVSS, CWE
          • ✏️Check-In Quiz
        • 6. Intro to Threats and Attacks
        • 7. Social Engineering
        • 8. Malware
        • 9. Cryptography
        • 10. Authentication, Authorization and Accounting (AAA)
        • 11. Security Frameworks, Standards and Regulations
        • 12. Digital Forensics and Incident Response
    • Cybrary
    • HackingLK
    • Hackviser
    • CWL
  • 📚Concepts
  • 🏁Challenges/CTFs
  • 🚩Walkthrough/Writeups
  • 🛠️Tools & Commands
  • 💎Projects
  • 📱Content Creation
  • 📝Cheat Sheets
  • 🔍OSINT Tools & Notes
  • 🐞Bug Bounty
  • 💡Research & Experiments
  • Templates & Reporting
  • Interview & Certification Prep
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🗃️Courseschevron-right
  2. TCMchevron-right
  3. Practical Security Fundamentalschevron-right
  4. 5. Vulnerabilities and Exploits

CVE, CVSS, CWE

hashtag
CVE YouTube Resouce:

hashtag
Links from the lesson:

Logohttps://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-44228cve.mitre.orgchevron-right
LogoNVD - cve-2021-44228nvd.nist.govchevron-right
LogoCWE - CWE-121: Stack-based Buffer Overflow (4.19.1)cwe.mitre.orgchevron-right

Previous🖥️Exploit Labchevron-leftNext✏️Check-In Quizchevron-right

Last updated 6 months ago

  • CVE YouTube Resouce:
  • Links from the lesson: