About 1,310,000 results
Open links in new tab
  1. CVE: Common Vulnerabilities and Exposures

    Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There are currently over 303,000 CVE Records accessible via Download or Keyword Search above. The CVE …

  2. Common Vulnerabilities and Exposures - Wikipedia

    MITRE Corporation's documentation defines CVE Identifiers (also called "CVE names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for publicly known …

  3. CVE security vulnerability database. Security vulnerabilities, …

    You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time

  4. NVD - Vulnerabilities

    CVE defines a vulnerability as: "A weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to …

  5. What is a CVE? - Red Hat

    Sep 4, 2024 · CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they mean a security flaw that's …

  6. What is CVE (Common Vulnerabilities and Exposures)? - IBM

    CVE (Common Vulnerabilities and Exposures) is a publicly disclosed catalog of information security vulnerabilities maintained by the MITRE Corporation.

  7. Database CVE, CWE, CISA KEV & Vulnerability Intelligence | CVE Find

    1 day ago · Common Vulnerabilities and Exposures (CVE), is a list of publicly disclosed computer security flaws.

  8. What Is a CVE? Common Vulnerabilities and Exposures Defined

    CVE defines vulnerabilities as a mistake within software code, which enables an attacker to gain direct unauthorized access to computer systems and networks and spread malware.

  9. Top 10 CVEs of 2025: High-Impact Vulnerabilities & Exploitation …

    6 days ago · This list highlights 10 of the most impactful CVEs of 2025, not as a ranking, but as a curated snapshot of the vulnerabilities that dominated headlines and shaped real-world attack …

  10. Security Update Guide - Microsoft Security Response Center

    Access Microsoft Security Response Center's guide to address vulnerabilities, manage security risks, and keep your systems protected with the latest updates.