CPE, which stands for Common Platform Enumeration, is a standardized scheme for naming hardware, software, and operating systems. CPE provides a structured naming scheme to uniquely identify and classify information technology systems, platforms, and packages based on certain attributes such as vendor, product name, version, update, edition, and language.
CWE, or Common Weakness Enumeration, is a comprehensive list and categorization of software weaknesses and vulnerabilities. It serves as a common language for describing software security weaknesses in architecture, design, code, or implementation that can lead to vulnerabilities.
CAPEC, which stands for Common Attack Pattern Enumeration and Classification, is a comprehensive, publicly available resource that documents common patterns of attack employed by adversaries in cyber attacks. This knowledge base aims to understand and articulate common vulnerabilities and the methods attackers use to exploit them.
Services & Price
Help & Info
Search : CVE id, CWE id, CAPEC id, vendor or keywords in CVE
Below you'll find a graph showing the number of CVEs (Common Vulnerabilities and Exposures) ranked by OWASP Top 10. This graph shows the distribution of the different types of vulnerabilities discovered since 1999. By analyzing this data, you can better understand current trends in IT security and identify the most frequent categories of vulnerability.
OWASP
Nb CVE
A03-Injection
77,146
A01-Broken Access Control
47,172
A07-Identif. and Authent. Fail
11,417
A04-Insecure Design
10,115
A02-Cryptographic Failures
5,591
A08-Soft and Data Integrity Fail
3,331
A05-Security Misconfiguration
1,695
A10-Server-Side Req. Forgery (SSRF)
1,611
A09-Security Log./Monit. Failures
1,018
A06-Vulnerable and Outdated Comp.
8
Evolution of CVE classified by OWASP Top 10
Below is a graph showing the number of CVEs (Common Vulnerabilities and Exposures) ranked by OWASP Top 10 since 2000. This graph allows you to visualize the evolution and distribution of the different types of vulnerabilities discovered and disclosed over the years. By analyzing this data, you can better understand historical trends in IT security and identify the most frequent categories of vulnerabilities.