- CVE: Common Vulnerabilities and Exposures
Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities There are currently over 303,000 CVE Records accessible via Download or Keyword Search above The CVE Program partners with community members worldwide to grow CVE content and expand its usage
- Common Vulnerabilities and Exposures - Wikipedia
MITRE Corporation's documentation defines CVE Identifiers (also called "CVE names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for publicly known information-security vulnerabilities in publicly released software packages
- CVE security vulnerability database. Security vulnerabilities, exploits . . .
You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
- NVD - Vulnerabilities
CVE defines a vulnerability as: "A weakness in the computational logic (e g , code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability
- CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation CVE-2025-61757 Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability
- What is a CVE? - Red Hat
CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws When someone refers to a CVE, they mean a security flaw that's been assigned a CVE ID number Security advisories issued by vendors and researchers almost always mention at least 1 CVE ID
- CVE. ICU - CVE Analysis Dashboard
CVE ICU provides comprehensive analysis and visualization of Common Vulnerabilities and Exposures (CVE) data from 1999 to present
- What is CVE (Common Vulnerabilities and Exposures)? - IBM
Common Vulnerabilities and Exposures (CVE) generally refers to the CVE list, a publicly disclosed catalog of information security vulnerabilities established and maintained by the MITRE Corporation
|