Metasploit achieves CVE compliance
Posted on 14 December 2010.
Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance.

CVE associates unique identifiers to security vulnerabilities and exposures to provide common names for publicly known problems. As a result of Metasploit’s CVE compatibility, Metasploit reports can now be more easily cross-referenced with other tools.

Rapid7 has enhanced the features of its software solutions with CVE to provide a reference method of information security vulnerabilities and exposures as defined by the National Cyber-Security Division of the United States Department of Homeland Security through the non-profit MITRE Corporation.

"As a leader in both vulnerability management and penetration testing, Rapid7 appreciates MITRE’s efforts to provide unique CVE identifiers across both of these areas,” said HD Moore, Rapid7 CSO and Metasploit chief architect. “This enables our customers to easily reference vulnerabilities and exploits across security solutions, including Metasploit penetration testing solutions and NeXpose vulnerability scanners."





Spotlight

Android Fake ID bug allows malware to impersonate trusted apps

Posted on 29 July 2014.  |  Bluebox Security researchers unearthed a critical Android vulnerability which can be used by malicious applications to impersonate specially recognized trusted apps - and get all the privileges they have - without the user being none the wiser.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //