{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/cve-common-vulnerabilities-and-exposures","result":{"data":{"contentfulDictionaryTerm":{"title":"CVE (Common Vulnerabilities and Exposures)","slug":"cve-common-vulnerabilities-and-exposures","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"The CVE database is a comprehensive online resource of known security threats. Learn how to use it to protect your organization from attack."}},"body":{"body":"# CVE - Common Vulnerabilities and Exposures\nAn online database of known attacks, exploits, and compromises operated by the MITRE organization for the benefit of the public. Often, breaches are documented long before an organization admits that they experienced a breach.","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"cve---common-vulnerabilities-and-exposures","style":"position:relative;"},"children":[{"type":"text","value":"CVE - Common Vulnerabilities and Exposures"},{"type":"element","tagName":"a","properties":{"href":"#cve---common-vulnerabilities-and-exposures","ariaLabel":"cve common vulnerabilities and exposures permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"An online database of known attacks, exploits, and compromises operated by the MITRE organization for the benefit of the public. Often, breaches are documented long before an organization admits that they experienced a breach."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"CVE (Common Vulnerabilities and Exposures)","slug":"cve-common-vulnerabilities-and-exposures","keepLearning":[{"title":"Catfishing","slug":"catfishing"},{"title":"Clickbait / Clickjacking","slug":"clickbait-clickjacking"},{"title":"Cloud","slug":"cloud"}],"breadcrumb":{"location":"/dictionary/cve-common-vulnerabilities-and-exposures","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/cve-common-vulnerabilities-and-exposures","crumbLabel":"cve-common-vulnerabilities-and-exposures"}]}}},"staticQueryHashes":["1614255152"]}