Organizations around the world, in every type of industry and market, are moving towards networks based on the Internet protocols.

A Progress Report on the CVE Initiative
Download Resources
PDF Accessibility
One or more of the PDF files on this page fall under E202.2 Legacy Exceptions and may not be completely accessible. You may request an accessible version of a PDF using the form on the Contact Us page.
Organizations around the world, in every type of industry and market, are moving towards networks based on the Internet protocols. In addition, third-party software has become a critical element to these organizations and the infrastructure of networks, utilities, and services they rely upon to function. That means the software problems in these commercial and open source software products can quickly cause significant difficulties for any organization. When such software problems have security implications, they are referred to as "vulnerabilities."