Vulnerabilities
Vulnerabilities are originated from system's security Bugs, which may exist in software programs and CMOS chips as well, and often utilized by hackers up to no good as the leaks to disable personal computers and networks. Want to know more about network vulnerabilities, please click here. |
What's CVE? |
CVE (Common Vulnerabilities and Exposures) is a list of vulnerabilities and exposures that aims to provide common names for publicly known problems. The goal of CVE is to make it easier to share data across separate vulnerability capabilities (tools, repositories, and services) with this "common enumeration." |
You may click CVE list below: to gain access to all CVE list. |
|
What is a CAN? |
CAN(CVE "Candidates") stand for those vulnerabilities or exposures under consideration for acceptance into CVE. Candidates are assigned with special numbers distinguishing them from CVE entries. However, these numbers may become CVE entries if the candidates are accepted into CVE. |
You may click CAN list below to gain access to all CAN list: |