Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-51 Rev. 1

Guide to Using Vulnerability Naming Schemes

Date Published: February 2011

Supersedes: SP 800-51 (September 2002)

Author(s)

David Waltermire (NIST), Karen Scarfone (G2)

Abstract

Keywords

CCE; Common Configuration Enumeration; Common Vulnerabilities and Exposures; CVE; SCAP; security automation; security configuration; Security Content Automation Protocol; vulnerabilities; vulnerability naming
Control Families

Audit and Accountability; Configuration Management; Incident Response; Risk Assessment; System and Services Acquisition;