Global web icon
cve.org
https://www.cve.org/
CVE: Common Vulnerabilities and Exposures
Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There are currently over 303,000 CVE Records accessible via Download or Keyword Search above. The CVE Program partners with community members worldwide to grow CVE content and expand its usage.
Global web icon
nist.gov
https://nvd.nist.gov/vuln
NVD - Vulnerabilities
CVE defines a vulnerability as: "A weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability.
Global web icon
cvedetails.com
https://www.cvedetails.com/
CVE security vulnerability database. Security vulnerabilities, exploits ...
You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
Global web icon
wikipedia.org
https://en.wikipedia.org/wiki/Common_Vulnerabiliti…
Common Vulnerabilities and Exposures - Wikipedia
MITRE Corporation's documentation defines CVE Identifiers (also called "CVE names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for publicly known information-security vulnerabilities in publicly released software packages.
Global web icon
redhat.com
https://www.redhat.com/en/topics/security/what-is-…
What is a CVE? - Red Hat
CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they mean a security flaw that's been assigned a CVE ID number. Security advisories issued by vendors and researchers almost always mention at least 1 CVE ID.
Global web icon
cvefind.com
https://www.cvefind.com/
Database CVE, CWE, CISA KEV & Vulnerability Intelligence | CVE Find
Common Vulnerabilities and Exposures (CVE), is a list of publicly disclosed computer security flaws.
Global web icon
cisa.gov
https://www.cisa.gov/news-events/alerts/2025/12/02…
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its KEV Catalog, based on evidence of active exploitation.
Global web icon
cve.icu
https://cve.icu/
CVE.ICU - CVE Analysis Dashboard
CVE.ICU provides comprehensive analysis and visualization of Common Vulnerabilities and Exposures (CVE) data from 1999 to present.
Global web icon
bleepingcomputer.com
https://www.bleepingcomputer.com/news/security/cis…
CISA orders feds to patch actively exploited Geoserver flaw
CISA has ordered U.S. federal agencies to patch a critical GeoServer vulnerability now actively exploited in XML External Entity (XXE) injection attacks.
Global web icon
cisco.com
https://sec.cloudapps.cisco.com/security/center/co…
Remote Code Execution Vulnerability in React and Next.js Frameworks ...
On December 3, 2025, the React team released a security advisory regarding a vulnerability, CVE-2025-55182, in the React server that could allow an unauthenticated, remote attacker to perform remote code execution on an affected device or system. For a description of this vulnerability, see the public React Security Advisory. Cisco's standard practice is to update integrated third-party ...