About 1,150,000 results
Open links in new tab
  1. CVE: Common Vulnerabilities and Exposures

    Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There are currently over 303,000 CVE Records accessible via Download or Keyword Search above. The CVE …

  2. NVD - Vulnerabilities

    CVE defines a vulnerability as: "A weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to …

  3. Common Vulnerabilities and Exposures - Wikipedia

    MITRE Corporation's documentation defines CVE Identifiers (also called "CVE names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for publicly known …

  4. CVE security vulnerability database. Security vulnerabilities, …

    You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time

  5. What is a CVE? - Red Hat

    Sep 4, 2024 · CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they mean a security flaw that's …

  6. CISA Adds Two Known Exploited Vulnerabilities to Catalog

    5 days ago · CISA has added two new vulnerabilities to its KEV Catalog, based on evidence of active exploitation.

  7. What Is a CVE? Common Vulnerabilities and Exposures Defined

    CVE defines vulnerabilities as a mistake within software code, which enables an attacker to gain direct unauthorized access to computer systems and networks and spread malware. This …

  8. Critical RCE Vulnerabilities Discovered in React & Next.js | Wiz Blog

    4 days ago · React and Next.js are exposed to critical unauthenticated RCE via CVE-2025-55182 and CVE-2025-66478. Learn which versions are impacted and how to mitigate.

  9. CVE.ICU - CVE Analysis Dashboard

    CVE.ICU provides comprehensive analysis and visualization of Common Vulnerabilities and Exposures (CVE) data from 1999 to present.

  10. China-nexus cyber threat groups rapidly exploit React2Shell ...

    2 days ago · Within hours of the public disclosure of CVE-2025-55182 (React2Shell) on December 3, 2025, Amazon threat intelligence teams observed active exploitation attempts by …