Understanding security terminology is essential for effectively managing vulnerabilities in your software. This guide explains common terms used in vulnerability databases and security advisories.
A weakness in a system, application, or protocol that can be exploited by a threat actor to perform unauthorized actions. Vulnerabilities can exist in software code, configurations, or design decisions.
An official notice published by a vendor, security researcher, or coordinating body that describes a security vulnerability, its impact, affected versions, and recommended remediation steps.
A standardized framework for rating the severity of security vulnerabilities on a scale of 0.0 to 10.0. CVSS considers factors like attack vector, complexity, privileges required, and impact on confidentiality, integrity, and availability.
Code, technique, or method that takes advantage of a vulnerability to cause unintended behavior, such as gaining unauthorized access, executing arbitrary code, or causing denial of service.
A software update that addresses one or more vulnerabilities. Patches may be released as part of regular updates or as emergency out-of-band releases for critical vulnerabilities.
A vulnerability that is actively being exploited before the vendor is aware of it or has released a patch. The term refers to the vendor having "zero days" to fix the issue before exploitation occurs.
A classification of how serious a vulnerability is, typically based on CVSS scores. Common severity levels are Critical (9.0-10.0), High (7.0-8.9), Medium (4.0-6.9), and Low (0.1-3.9).
A package management system or platform where software dependencies are distributed. Each ecosystem has its own registry, naming conventions, and versioning schemes.
A specific software package or library that contains a vulnerability. Advisories typically list affected version ranges and fixed versions for each impacted package.
These authoritative sources provide reliable vulnerability information and security guidance.
The U.S. government repository of standards-based vulnerability management data, including CVE entries and CVSS scores.
The authoritative source for CVE identifiers, maintained by MITRE Corporation.
A curated database of security advisories for open source software, with GHSA identifiers.
The Forum of Incident Response and Security Teams maintains the CVSS specification and calculator.
A distributed vulnerability database for open source software, aggregating data from multiple sources.
A catalog of vulnerabilities known to be actively exploited, maintained by the U.S. Cybersecurity and Infrastructure Security Agency.
A community-developed list of software and hardware weakness types, providing a common language for vulnerability classification.
The Open Web Application Security Project provides free resources on application security, including the OWASP Top 10.