What is cve
Last updated: April 1, 2026
Key Facts
- CVE is maintained by the MITRE Corporation and funded by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)
- Each vulnerability receives a unique CVE ID in the format CVE-YYYY-NNNN (e.g., CVE-2023-1234), making it easy to reference and track specific security issues
- The CVE database is publicly accessible and free to use, containing information about thousands of documented security vulnerabilities across all software platforms
- CVE serves as the industry standard for vulnerability tracking, used by security professionals, software vendors, government agencies, and organizations worldwide
- When a vulnerability is assigned a CVE ID, vendors typically release patches or updates to address it, and organizations use CVE information to prioritize their security updates
Overview
CVE stands for Common Vulnerabilities and Exposures, a comprehensive system for identifying and organizing security vulnerabilities in software and hardware. Think of CVE as a standardized dictionary of security flaws—it provides a common language that allows security professionals, vendors, and organizations to communicate about specific security problems. By assigning unique identifiers to vulnerabilities, CVE enables better coordination in addressing cybersecurity threats.
History and Purpose
The CVE system was created in 1999 and is maintained by the MITRE Corporation, with funding and oversight from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The primary purpose of CVE is to standardize the naming and identification of security vulnerabilities. Before CVE, different organizations used different names and classification systems for the same vulnerability, making it difficult to track and coordinate responses. CVE solved this problem by establishing a single, authoritative source for vulnerability information.
How CVE IDs Work
Each vulnerability registered in the CVE system receives a unique identifier called a CVE ID. These IDs follow a standardized format: CVE-YYYY-NNNN, where YYYY is the year the vulnerability was reported, and NNNN is a sequential number. For example, CVE-2023-12345 refers to a specific vulnerability discovered in 2023. This standardized naming convention makes it easy to reference vulnerabilities in reports, databases, and communications. When a security researcher discovers a vulnerability, they can request a CVE ID from designated CVE Numbering Authorities (CNAs), which then becomes the official identifier for that vulnerability.
The CVE Database
The official CVE list is publicly accessible through the National Vulnerability Database (NVD), maintained by the National Institute of Standards and Technology (NIST). This database contains detailed information about each CVE, including:
- A description of the vulnerability
- The affected software and versions
- The severity rating (using the CVSS score)
- Available patches or mitigations
- References to detailed technical information
- Publication dates and modified dates
Why CVE Matters for Cybersecurity
CVE provides the foundation for modern cybersecurity management. Organizations use CVE identifiers to prioritize security updates based on which vulnerabilities might affect their systems. Software vendors use CVE to track bugs and release patches systematically. Security researchers use CVE to communicate about threats and share discoveries. Government agencies and compliance frameworks (like HIPAA and PCI-DSS) reference CVE IDs when establishing security requirements. The standardization provided by CVE significantly improves the speed and effectiveness of the global response to security threats.
CVE vs. CVSS Severity Ratings
It's important to note that CVE itself only identifies the vulnerability; it doesn't rate its severity. That's where CVSS (Common Vulnerability Scoring System) comes in. While CVE assigns an ID to a vulnerability, CVSS provides a numerical score (0-10) indicating how serious the vulnerability is. A vulnerability might have a low CVSS score if it's difficult to exploit, or a high score if it poses an immediate threat to many systems.
Related Questions
What is CVSS and how does it differ from CVE?
CVSS (Common Vulnerability Scoring System) rates the severity of a vulnerability on a 0-10 scale, while CVE is the identifier and catalog system. CVE tells you which vulnerability exists; CVSS tells you how serious it is.
How often are new CVE IDs assigned?
New CVE IDs are assigned continuously as vulnerabilities are discovered. Thousands of new CVEs are assigned annually across all software types and platforms worldwide.
Can anyone request a CVE ID?
Security researchers and organizations can request CVE IDs through designated CVE Numbering Authorities (CNAs), though the process requires verification and documentation of the vulnerability.
More What Is in Daily Life
- What Is a Credit ScoreA credit score is a three-digit number, typically ranging from 300 to 850, that represents your cred…
- What Is CD rates make no sense based on length of time invested. Explain like I'm 5CD (Certificate of Deposit) rates often don't increase with longer lock-up times the way people expe…
- What is a phdA PhD (Doctor of Philosophy) is a doctoral degree earned after completing advanced academic research…
- What is a polymathA polymath is a person with deep knowledge and expertise across multiple different fields or academi…
- What is aaveAAVE stands for African American Vernacular English, a dialect with distinct grammar, pronunciation,…
- What is aarch64ARMv8-A (commonly called ARM64 or AArch64) is a 64-bit processor architecture developed by ARM Holdi…
- What is about menTopics and discussions about men typically encompass masculinity, male identity, gender roles, men's…
- What is abiturAbitur is the German academic qualification awarded upon completion of secondary education, typicall…
- What is abrosexualAbrosexual is a sexual orientation identity where a person's sexual attraction changes or fluctuates…
- What is abgABG is an Indonesian acronym standing for 'Anak Baru Gede,' which refers to adolescent girls or teen…
- What is aaaAAA batteries are a standard cylindrical battery size measuring 10.5mm in diameter and 44.5mm in len…
- What is aacAAC (Advanced Audio Codec) is a digital audio compression format that provides better sound quality …
- What is aaa gameAAA games are high-budget video games developed by large studios with budgets typically exceeding $1…
- What is a proxyA proxy is a server that acts as an intermediary between your device and the internet, forwarding yo…
- What is ableismAbleism is discrimination and prejudice against people with disabilities based on the assumption tha…
- What is absAbs, short for abdominal muscles, are the muscles in your core that flex your spine and stabilize yo…
- What is abortionAbortion is a medical procedure that ends pregnancy by removing the fetus before viability. It can b…
- What is accutaneAccutane (isotretinoin) is a powerful prescription medication derived from vitamin A used to treat s…
- What is acetaminophenAcetaminophen, also known as paracetamol, is an over-the-counter pain reliever and fever reducer use…
- What is acidAcid is a chemical substance that donates protons (hydrogen ions) to other substances, characterized…
Also in Daily Life
- How To Save Money
- Why are so many white supremacist and right wings grifters not white
- Does "I'm 20 out" mean youre 20 minutes away from where you left, or youre 20 minutes away from your destination
- Why are so many men convinced that they are ugly
- What does awol mean
- What does asl mean
- What does ad mean
- What does asap mean
- What does apex mean
- What does asmr stand for
- What does atp mean
- What causes autism
- What does abg mean
- What does am and pm mean
- What does a fox sound like
More "What Is" Questions
Trending on WhatAnswer
Browse by Topic
Browse by Question Type
Sources
- CVE Official Website Public Domain
- NIST Guide to Enterprise Patch Management Public Domain