About 1,090,000 results
Open links in new tab
  1. CVE: Common Vulnerabilities and Exposures

    Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There are currently over 309,000 CVE Records accessible via Download or Keyword Search above. The CVE …

  2. Common Vulnerabilities and Exposures - Wikipedia

    Logo The Common Vulnerabilities and Exposures (CVE) system, originally Common Vulnerability Enumeration, [1] provides a reference method for publicly known information-security …

  3. NVD - Vulnerabilities

    CVE defines a vulnerability as: "A weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to …

  4. CVE security vulnerability database. Security vulnerabilities, …

    You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time

  5. What is a CVE? - Red Hat

    Sep 4, 2024 · CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they mean a security flaw that's …

  6. What is CVE (Common Vulnerabilities and Exposures)? - IBM

    CVE (Common Vulnerabilities and Exposures) is a publicly disclosed catalog of information security vulnerabilities maintained by the MITRE Corporation.

  7. Current Common Vulnerabilities and Exposures - Feedly

    Dec 9, 2025 · Welcome to Feedly CVEs — Research critical vulnerabilities (CVEs) with all the real-time and historical information you need to assess the risk to your organization. This free …

  8. CWE - Common Weakness Enumeration

    Dec 8, 2025 · News CWE Version 4.19 Now Available Video “Effectively Mapping CVEs to CWEs” News “2025 CWE™ Most Important Hardware Weaknesses” Now Available Podcast Mapping …

  9. What Is a CVE? Common Vulnerabilities and Exposures Defined

    CVE defines vulnerabilities as a mistake within software code, which enables an attacker to gain direct unauthorized access to computer systems and networks and spread malware.

  10. Security Advisory: CVE-2025-66478 - Next.js

    Dec 3, 2025 · A critical vulnerability (CVE-2025-66478) has been identified in the React Server Components protocol. Users should upgrade to patched versions immediately.