About 216,000 results
Open links in new tab
  1. CVE: Common Vulnerabilities and Exposures

    Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There are currently over 321,000 CVE Records accessible via Download or Keyword Search above. The CVE Program …

  2. NVD - Vulnerabilities

    CVE defines a vulnerability as: "A weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, …

  3. CVE security vulnerability database. Security vulnerabilities, exploits ...

    You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time

  4. Common Vulnerabilities and Exposures - Wikipedia

    MITRE Corporation's documentation defines CVE Identifiers (also called "CVE names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for publicly known information-security …

  5. Database CVE, CWE, CISA KEV & Vulnerability Intelligence | CVE Find

    What is a CVE? A CVE (Common Vulnerability and Exposure) is a unique identifier assigned to a publicly disclosed computer security flaw. Each CVE is managed by MITRE Corporation and …

  6. What is a CVE? - Red Hat

    Sep 4, 2024 · CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they mean a security flaw that's been …

  7. CVE Threat Database | Real-Time Security Insights

    9 hours ago · CVE Database Dashboard – Real-time tracking of cybersecurity threats. Monitor the latest Common Vulnerabilities and Exposures (CVEs), analyze trends, and stay informed with real-time …

  8. What is CVE (Common Vulnerabilities and Exposures)? - IBM

    CVE (Common Vulnerabilities and Exposures) is a publicly disclosed catalog of information security vulnerabilities maintained by the MITRE Corporation.

  9. CVE-2026-35616 Fortinet FortiClientEMS zero-day exploited

    5 days ago · Key takeaways: CVE-2026-35616, an improper access control vulnerability, has been exploited in the wild as a zero-day. Public exploit code has been identified and Fortinet products …

  10. Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain …

    3 days ago · Docker CVE-2026-34040 enables AuthZ bypass via padded requests, risking host compromise; fixed in version 29.3.1.