Every publicly known software vulnerability gets a CVE number and a severity score. Search by CVE ID or keyword to see what systems are affected, how severe the flaw is, and how it can be exploited. Critical for threat intelligence teams assessing whether software they care about has known weaknesses that attackers are actively targeting.