Common Vulnerabilities and Exposures
- Do you prefer fixed length or variable length?
- If you prefer fixed length, what field length do you consider sufficient?
- Any comment on Adam’s suggestion of trailing zeros?
Use of the Common Vulnerabilities and Exposures (CVE®) List and the associated references from this website are subject to the terms of use. CVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Copyright © 1999–2021, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation.