Answers to your questions

Quickly find answers to your questions about cybersecurity, CVE Find, standards, vulnerabilities and Bexxo services in our comprehensive FAQ.

FAQ

What is the difference between CVE Find and the official cve.org website?

The cve.org website, managed by MITRE, is the official source of CVE identifiers. It is essential for ensuring the uniqueness and structure of entries. However, cve.org focuses on the administrative aspect and does not provide EPSS scores, exploitation indicators, or advanced sorting functionalities.

Our CVE Find service takes this official data, enriches it with complementary metrics (KEV, EPSS, CVSS), and presents it in a more modern, faster, and filterable interface. It is therefore a practical monitoring tool, designed for operational and decision-making use on a daily basis.

What is the difference between a CVE and a zero-day?

A CVE (Common Vulnerabilities and Exposures) is a security flaw that has already been identified, documented, and published in an official database. It is known to the public, and generally, patches are in progress or already available. In contrast, a zero-day is a flaw that has not yet been disclosed, and therefore not recorded in a CVE at the time of its discovery.

In other words, any zero-day can become a CVE, but not all CVEs are zero-days. The major risk of a zero-day is precisely that it can be exploited before it is even reported, whereas a CVE is by definition a vulnerability in the process of being addressed or corrected.

What is the difference between a CVE and an exploited vulnerability?

A CVE is simply a public declaration that a flaw exists in a given product, while an exploited vulnerability means that an attacker is actively using this flaw to compromise systems. In other words, not all CVEs are exploited in real-world conditions: some may remain theoretical or technical.

Conversely, a vulnerability can be exploited without yet having received a CVE - this is what is called a zero-day. To assess the real danger of a CVE, it is necessary to consult additional information such as the CISA's KEV data or the EPSS score, which indicate whether the flaw is actively used in cyberattacks. This information is available directly from our website CVE Find.

What is the difference between a black box, gray box, and white box pentest?

The main difference between black box, gray box, and white box testing lies in the level of information provided to the tester before starting the simulated attack.

  • In black box, the attacker has no prior knowledge of the system. They act as an external hacker and attempt to access resources without any assistance. This type of test is realistic for simulating an external attack, but it is often limited to what can be guessed or discovered from the outside.
  • In gray box, the tester has some technical information or partial access (such as a user account). This reflects a scenario where the attacker has already infiltrated part of the system or possesses internal knowledge, such as a former employee.
  • In white box, all information is provided: source code, technical documentation, administrator access. This type of test provides a complete view and allows for the identification of deep vulnerabilities, often invisible from the outside.

Each approach has its advantages, and the choice depends on the objectives of the test and the level of risk to be covered.

What is the difference between a pentest and a vulnerability scan?

A vulnerability scan is an automated analysis performed by a tool that examines a system or application for known vulnerabilities, typically by comparing software versions or testing configurations. It is fast and inexpensive, but often produces raw or incomplete results, with false positives.

A pentest, on the other hand, goes beyond detection: it seeks to actually exploit vulnerabilities to demonstrate their concrete impact. It is a manual and methodical process that validates detected vulnerabilities, identifies new ones, and provides realistic attack scenarios. The pentest is therefore much more thorough and contextual, but requires time, expertise, and planning.

What is the difference between security awareness and technical training?

Security awareness aims to spread a general security culture, accessible to all employees, regardless of their profession or technical level. It covers concrete topics: phishing, passwords, mobility, social networks, vigilance in teleworking, etc. The goal is to make everyone an actor in security in their daily uses.

Technical training, on the other hand, is aimed at more specialized profiles (IT teams, devs, admins) and focuses on specific skills such as system hardening, secure development, or incident management. It often requires prerequisites and aims to strengthen security through technical mastery.

What is the purpose of the CVE Find website?

Our service www.cvefind.com is a search and monitoring platform dedicated to IT vulnerabilities. It allows cybersecurity professionals, developers, administrators, or CISOs to quickly consult known vulnerabilities (CVEs), track their evolution, and access additional indicators to prioritize remediation.

Our goal with CVE Find is to make information more accessible, readable, and actionable than on official databases, which are often too technical or not very user-friendly. We centralize useful data (CVSS, EPSS, KEV status, dates, affected products), and facilitate decision-making for remediation or alert actions.

What is the purpose of the CWE classification?

The CWE classification serves to standardize the understanding of security weaknesses in computer systems. It helps developers, testers, and analysts identify common design or coding errors, in order to avoid or correct them more effectively. Thanks to this taxonomy, security tools can produce consistent and actionable reports.

It is also very useful for training technical teams, evaluating detection tools, prioritizing risks, and complying with certain standards such as ISO/IEC 27001. By integrating CWEs into development processes, security can be significantly improved from the design phase.

  • Tags:  
  • CWE
Who is Bexxo and what are its specialties?

Bexxo is a cybersecurity expert company based in Neuchâtel, Switzerland. We conduct audits, offer consulting services, and help our clients improve the protection of their IT systems against current threats.

Who should be trained in an SME?

In an SME, all employees should be trained, at least on the basics of cybersecurity. Every profile is concerned: the administrative staff who manage sensitive documents, the sales representative who exchanges emails with external parties, or the technician who accesses management tools. The training must be adapted to the role and the risks associated with each position.

In addition, technical teams, security referents (when they exist), and management must undergo more in-depth training to understand the issues, manage decisions, and react effectively in the event of an incident. In an SME, where resources are limited, training intelligently and progressively is often more realistic than aiming for exhaustiveness.

Who uses CAPECs and why?

Cybersecurity professionals are the primary users of CAPECs: SOC analysts, penetration testing experts, security architects, developers, trainers, or threat intelligence teams. They use them to understand adversary tactics, prepare test scenarios, and strengthen defenses.

For example, a pentester can use a CAPEC to structure a simulated attack according to a realistic scenario. A developer can find guidance on design flaws to avoid. A CISO can integrate them into risk analyses to better illustrate the potential consequences of a technical weakness.

Why are CVEs important for cybersecurity?

CVEs play a central role in vulnerability management. They provide a common language for all cybersecurity stakeholders to track and document vulnerabilities, which allows for prioritizing patches, automating analyses, and structuring security monitoring. Without CVEs, each vendor or researcher could describe a vulnerability differently, making coordination complex.

They are also used by vulnerability scanning tools, SIEMs, SOCs, and CISOs to establish incident response policies. Their global adoption ensures that vulnerabilities are identifiable and that defenses can be activated more quickly and in a coordinated manner.

  • Tags:  
  • CVE
Why define clear cybersecurity objectives?

Precise and measurable objectives help structure available resources, anticipate threats, and implement targeted action plans to strengthen the overall resilience of your infrastructure.

Why does CISA publish a KEV list?

The KEV (Known Exploited Vulnerabilities) list published by CISA identifies vulnerabilities that are actively exploited in the wild, meaning they are already being used in real-world cyberattacks. The purpose of this list is to help organizations prioritize their remediation efforts by focusing on vulnerabilities that pose an immediate threat.

By publishing this list, CISA provides a very practical risk management tool: it identifies not only known vulnerabilities, but also the most critical and urgent ones. For U.S. federal agencies, patching these vulnerabilities is mandatory within strict deadlines. But beyond the United States, the KEV is widely consulted by cybersecurity professionals worldwide to guide their patch management strategy.

Why is a zero-day vulnerability so dangerous?

Zero-day vulnerabilities are particularly dangerous because they are unknown to vendors, users, and often traditional security solutions (antivirus, IDS, etc.). This means that there is no fix, no patch, and often no detection or protection mechanism at the time of the attack.

Attackers can therefore exploit them without being detected, often as part of targeted and sophisticated attacks (cyber espionage, sabotage, prolonged access to a system). Their value is so high that some zero-days are resold on the dark web or to government actors for hundreds of thousands of euros.