_______ is a list of publicly known cybersecurity vulnerabilities, each with their own identification number and description.
Fill in the blank(s) with the appropriate word(s).
Common Vulnerabilities and Exposures
Computer Science & Information Technology