FAQs

Commonly asked questions about vulnerabilities and our website

A 'vulnerability' is a weakness or flaw that can be exploited by attackers or threat source, potentially compromising the confidentiality, integrity, or availability of data, systems or services.



In plain english. Confidentiality means your (or your cusotmer) private data has been stolen or accessed by unuthoirsed individuals and could well become publicly available after which it will be out there forever for anyone to see. Integrity means your data can no longer be trusted so any process that relies on the data such as reporting, monitoring, regulated tasks, customer details, the outputs may be useless and normal business operations cant resume until you figure out when the issue occured and corrected it. Availablity means you cannot access your (or your customer) data/systems so you cant conduct business operations until it comes back, the business is effectively shutdown by attackers.

For more detailed definitions, visit;



Understanding vulnerabilities - NCSC.GOV.UK

Vulnerability Glossary - CSRC.NIST.GOV

There are 'many' types and vulnerabilities often depend on the nature of the affected asset, in some cases the type is common such as encryption, misconfiguration and authentication, below is a snippet to give you an idea:



  • Public-facing services (like websites, APIs, and applications) commonly face issues such as remote code execution, injection (e.g. SQL, Command), web application (e.g. cross-site scripting, input validation flaws, Insecure deserialization, Server‑side request forgery), denial of service, broken authentication, misconfigurations, insecure coding
  • Infrastructure components (such as servers, firewalls, and network devices, vpn gateways) are often affected by misconfigurations, denial of service, authentication, access control and privilege escalation, memory utilization, all of which can be exploited to gain deeper access or disrupt services.
  • Endpoints (like laptops, desktops, and mobile devices) typically face risks such as local privilege escalation, malicious code execution, insecure software, and vulnerabilities in commonly used applications like browsers and office tools.



Vulnerability types in CVE data have been classified using the CWE (Common Weakness Enumeration) system which includes hundreds of defined weakness types.

For the latest NIST NVD data, visit our CVE search and insights page where you can view by 24hrs, 7, 30 or 90 days data.

No. We cannot provide garantees or assurance on the timeliness or the quality of the information being shared with you. All data, news, opinions on this website is provided "as is" from the source and its best efforts only.



We cannot and do not replace a lack of policy, process, responsibility for your organisation. You must ensure you have these in place with apporpriate support contracts for timely notifications and updates.



For advice on managing vulnerabilities, here is some advice and guidance.

U.K. NCSC Guidance for Vulnerability Management

U.S. NIST Guidance for Vulnerbaility Management

EPSS (Exploit Prediction Scoring System) estimates the probability that a vulnerability will be exploited by Threat Actors. It focuses on attacker behavior and also contextual threats based on your organisation including security maturity.



The traditional CVSS (Common Vulnerability Scoring System) measures the technical severity of the flaw itself (e.g., how bad the impact is, how complex the exploit is), but does not factor in real-world exploitation likelihood.



We use EPSS for prioritization and CVSS for impact assessment.