CPE, which stands for Common Platform Enumeration, is a standardized scheme for naming hardware, software, and operating systems. CPE provides a structured naming scheme to uniquely identify and classify information technology systems, platforms, and packages based on certain attributes such as vendor, product name, version, update, edition, and language.
CWE, or Common Weakness Enumeration, is a comprehensive list and categorization of software weaknesses and vulnerabilities. It serves as a common language for describing software security weaknesses in architecture, design, code, or implementation that can lead to vulnerabilities.
CAPEC, which stands for Common Attack Pattern Enumeration and Classification, is a comprehensive, publicly available resource that documents common patterns of attack employed by adversaries in cyber attacks. This knowledge base aims to understand and articulate common vulnerabilities and the methods attackers use to exploit them.
Services & Price
Help & Info
Search : CVE id, CWE id, CAPEC id, vendor or keywords in CVE
Below you'll find a graph showing the number of CVEs (Common Vulnerabilities and Exposures) ranked by OWASP Top 10. This graph shows the distribution of the different types of vulnerabilities discovered since 1999. By analyzing this data, you can better understand current trends in IT security and identify the most frequent categories of vulnerability.
OWASP
Nb CVE
A03-Injection
81,464
A01-Broken Access Control
49,582
A07-Identif. and Authent. Fail
12,076
A04-Insecure Design
10,988
A02-Cryptographic Failures
5,786
A08-Soft and Data Integrity Fail
3,574
A10-Server-Side Req. Forgery (SSRF)
1,794
A05-Security Misconfiguration
1,759
A09-Security Log./Monit. Failures
1,086
A06-Vulnerable and Outdated Comp.
14
Evolution of CVE classified by OWASP Top 10
Below is a graph showing the number of CVEs (Common Vulnerabilities and Exposures) ranked by OWASP Top 10 since 2000. This graph allows you to visualize the evolution and distribution of the different types of vulnerabilities discovered and disclosed over the years. By analyzing this data, you can better understand historical trends in IT security and identify the most frequent categories of vulnerabilities.