A 'vulnerability' is a weakness or flaw that can be exploited by attackers or threat source, potentially compromising the confidentiality, integrity, or availability of data, systems or services.
In plain english. Confidentiality means your (or your cusotmer) private data has been stolen or accessed by unuthoirsed individuals and could well become publicly available after which it will be out there forever for anyone to see. Integrity means your data can no longer be trusted so any process that relies on the data such as reporting, monitoring, regulated tasks, customer details, the outputs may be useless and normal business operations cant resume until you figure out when the issue occured and corrected it. Availablity means you cannot access your (or your customer) data/systems so you cant conduct business operations until it comes back, the business is effectively shutdown by attackers.
For more detailed definitions, visit;
There are 'many' types and vulnerabilities often depend on the nature of the affected asset, in some cases the type is common such as encryption, misconfiguration and authentication, below is a snippet to give you an idea:
Vulnerability types in CVE data have been classified using the CWE (Common Weakness Enumeration) system which includes hundreds of defined weakness types.
For the latest NIST NVD data, visit our CVE search and insights page where you can view by 24hrs, 7, 30 or 90 days data.
No. We cannot provide garantees or assurance on the timeliness or the quality of the information being shared with you. All data, news, opinions on this website is provided "as is" from the source and its best efforts only.
We cannot and do not replace a lack of policy, process, responsibility for your organisation. You must ensure you have these in place with apporpriate support contracts for timely notifications and updates.
For advice on managing vulnerabilities, here is some advice and guidance.
EPSS (Exploit Prediction Scoring System) estimates the probability that a vulnerability will be exploited by Threat Actors. It focuses on attacker behavior and also contextual threats based on your organisation including security maturity.
The traditional CVSS (Common Vulnerability Scoring System) measures the technical severity of the flaw itself (e.g., how bad the impact is, how complex the exploit is), but does not factor in real-world exploitation likelihood.
We use EPSS for prioritization and CVSS for impact assessment.