_______ is a list of publicly known cybersecurity vulnerabilities, each with their own identification number and description.

Fill in the blank(s) with the appropriate word(s).

Common Vulnerabilities and Exposures

Computer Science & Information Technology

You might also like to view...

A range name cannot include special characters or ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Export command is found in the Backstage View

Indicate whether the statement is true or false

Computer Science & Information Technology