Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

CVE (Common Vulnerabilities and Exposures)

A standardized identifier assigned to publicly known cybersecurity vulnerabilities.

A CVE (Common Vulnerabilities and Exposures) is a unique identifier assigned to a publicly disclosed cybersecurity vulnerability. Each CVE entry follows the format CVE-YEAR-NUMBER (for example, CVE-2024-12345) and provides a standardized reference that allows security professionals, vendors, and organizations to communicate about specific vulnerabilities without ambiguity.

How It Works

The CVE system is maintained by the MITRE Corporation with oversight from the CVE Board. When a new vulnerability is discovered and publicly disclosed, a CVE Numbering Authority (CNA) assigns it a unique CVE ID. The CVE entry includes a brief description of the vulnerability, affected products, and references to advisories, patches, and technical details.

The process begins when a researcher discovers a vulnerability and reports it to the affected vendor or a CNA. During the coordination period, the vendor develops a fix while the vulnerability details remain confidential. Once a patch is available or the disclosure timeline expires, the CVE is published with its full details. Some vulnerabilities receive CVE assignments before public disclosure to allow coordination; these appear as "reserved" entries until the details are released.

CVE entries serve as the foundation for vulnerability management workflows. Security scanners reference CVE IDs to identify known vulnerabilities in software. Patch management systems track which CVEs have been addressed. Threat intelligence feeds correlate CVE IDs with active exploitation data. Organizations maintain lists of CVEs affecting their systems and prioritize remediation based on severity and exploitability.

Why It Matters

CVE identifiers create a common language for discussing vulnerabilities across the security industry. When a security assessment identifies that an application uses a component affected by a specific CVE, the finding is immediately actionable because the CVE links to detailed information about the vulnerability, its severity, and available patches. Without this standardization, vulnerability tracking and communication would be far more fragmented and error-prone.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment