Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities

Published

Author(s)

Elizabeth B. Lennon

Abstract

: Today more than ever, timely response to vulnerabilities is critical to maintain the operational availability, confidentiality, and integrity of information technology (IT) systems. To assist federal agencies and industry respond to vulnerabilities in a timely manner, ITL recently released two new publications dealing with vulnerabilities in computer systems: NIST Special Publication (SP) 800-40, Procedures for Handling Security Patches, by Peter Mell and Miles C. Tracy, and NIST SP 800-51, Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme, by Peter Mell and Tim Grance. This ITL Bulletin summarizes these two documents on system vulnerabilities, available at http://csrc.nist.gov/publications/nistpubs/index.html.
Citation
Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities

Keywords

common vulnerabilities and exposures CVE, computer security, CVE, security patches, vulnerabilities, vulnerability naming scheme

Citation

Lennon, E. (2002), Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities, Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=150702 (Accessed March 29, 2024)
Created October 1, 2002, Updated February 19, 2017