
CVE: Common Vulnerabilities and Exposures
Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There are currently over 303,000 CVE Records accessible via Download or Keyword Search above. The CVE …
NVD - Vulnerabilities
CVE defines a vulnerability as: "A weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to …
Common Vulnerabilities and Exposures - Wikipedia
MITRE Corporation's documentation defines CVE Identifiers (also called "CVE names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for publicly known …
CVE security vulnerability database. Security vulnerabilities, …
You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
What is a CVE? - Red Hat
Sep 4, 2024 · CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they mean a security flaw that's …
CISA Adds Two Known Exploited Vulnerabilities to Catalog
5 days ago · CISA has added two new vulnerabilities to its KEV Catalog, based on evidence of active exploitation.
What Is a CVE? Common Vulnerabilities and Exposures Defined
CVE defines vulnerabilities as a mistake within software code, which enables an attacker to gain direct unauthorized access to computer systems and networks and spread malware. This …
Critical RCE Vulnerabilities Discovered in React & Next.js | Wiz Blog
4 days ago · React and Next.js are exposed to critical unauthenticated RCE via CVE-2025-55182 and CVE-2025-66478. Learn which versions are impacted and how to mitigate.
CVE.ICU - CVE Analysis Dashboard
CVE.ICU provides comprehensive analysis and visualization of Common Vulnerabilities and Exposures (CVE) data from 1999 to present.
China-nexus cyber threat groups rapidly exploit React2Shell ...
2 days ago · Within hours of the public disclosure of CVE-2025-55182 (React2Shell) on December 3, 2025, Amazon threat intelligence teams observed active exploitation attempts by …