Common Vulnerabilities and Exposures
- Do you prefer fixed length or variable length?
- If you prefer fixed length, what field length do you consider sufficient?
- Any comment on Adam’s suggestion of trailing zeros?
Contact Us | Terms of Use | Privacy Policy | Site Map | Search this Site | Follow CVE
Use of the Common Vulnerabilities and Exposures (CVE®) List and the associated references from this website are subject to the terms of use. CVE is sponsored by NSD, NCCIC in CISA’s Cybersecurity Division at the U.S. Department of Homeland Security. Copyright © 1999–2019, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation.