CPE, which stands for Common Platform Enumeration, is a standardized scheme for naming hardware, software, and operating systems. CPE provides a structured naming scheme to uniquely identify and classify information technology systems, platforms, and packages based on certain attributes such as vendor, product name, version, update, edition, and language.
CWE, or Common Weakness Enumeration, is a comprehensive list and categorization of software weaknesses and vulnerabilities. It serves as a common language for describing software security weaknesses in architecture, design, code, or implementation that can lead to vulnerabilities.
CAPEC, which stands for Common Attack Pattern Enumeration and Classification, is a comprehensive, publicly available resource that documents common patterns of attack employed by adversaries in cyber attacks. This knowledge base aims to understand and articulate common vulnerabilities and the methods attackers use to exploit them.
Services & Price
Help & Info
Search : CVE id, CWE id, CAPEC id, vendor or keywords in CVE
Below you'll find a graph showing the number of CVEs (Common Vulnerabilities and Exposures) ranked by OWASP Top 10. This graph shows the distribution of the different types of vulnerabilities discovered since 1999. By analyzing this data, you can better understand current trends in IT security and identify the most frequent categories of vulnerability.
OWASP
Nb CVE
A03-Injection
72,879
A01-Broken Access Control
44,822
A07-Identif. and Authent. Fail
10,936
A04-Insecure Design
9,458
A02-Cryptographic Failures
5,469
A08-Soft and Data Integrity Fail
3,095
A05-Security Misconfiguration
1,637
A10-Server-Side Req. Forgery (SSRF)
1,487
A09-Security Log./Monit. Failures
980
A06-Vulnerable and Outdated Comp.
6
Evolution of CVE classified by OWASP Top 10
Below is a graph showing the number of CVEs (Common Vulnerabilities and Exposures) ranked by OWASP Top 10 since 2000. This graph allows you to visualize the evolution and distribution of the different types of vulnerabilities discovered and disclosed over the years. By analyzing this data, you can better understand historical trends in IT security and identify the most frequent categories of vulnerabilities.