Impact (low/moderate/important/critical)
Date published
A CVE record would look something like this:
ID: CVE-2020-5313
Description: An out-of-bounds read was discovered in python-pillow in
the way it decodes FLI images. An application that uses python-pillow
to load untrusted images may be vulnerable to this flaw, which can
allow attackers to read the memory of the application they should be
not allowed to read.
Impact: Moderate
Date: January 3, 2020
Using Nmap for Vulnerability Scanning
Nmap, which is short for Network Mapper, is a free
open-source utility for network discovery and security
auditing. Nmap is commonly used for network scanning
or vulnerability scanning. Target users for this tool are
pen testers, security professionals, and system
administrators. Nmap provides detailed and real-time
snapshot information of the devices or hosts on a
network. Nmap primarily provides three functionalities.
It gives detailed information on every IP active on a network, and each
IP address can then be scanned for more details, if needed.
It provides a list of live hosts and open ports and identifies the OS of
every connected device. This makes Nmap an excellent system-
monitoring and pen-testing tool.
It helps identify security vulnerabilities to protect against attacks.
The best way to get familiar with Nmap is to use it. Nmap
is available with macOS and Linux by default. Example
14-1 shows some of the command-line options available.
Example 14-1 Using Nmap for Network and
Vulnerability Scanning
Click here to view code image