|
|||||
CVE Entries (also referred to by the community as "CVE Identifiers," "CVE IDs," "CVE names," "CVE numbers," and "CVEs") are unique, common identifiers for publicly known cybersecurity vulnerabilities. Information is included about the topics below.
Each CVE Entry includes the following:
States of CVE Entries |
More details about? |
How do I? |
Other questions? |
The process of creating a CVE Entry begins with the discovery of a potential security vulnerability or exposure. The information is then assigned a CVE ID by a CVE Numbering Authority (CNA), a Description and References are added by the CNA, and then the CVE Entry is posted on the CVE website by the CVE Program Root CNA.
The documents below explain the creation of entries in more detail:
CVE List Rules and Guidance, which are the guidelines the CVE program uses to ensure that CVE Entries are created in a consistent fashion, independent of which CVE Numbering Authority (CNA) is doing the creation, include the following:
Defines the role and responsibilities of CNAs; shows the number and types of participating CNAs from around the world; provides documentation for CNAs, including the CNA Rules document and Researcher Reservation Guidelines; and provides details of how to become a CNA.
Provides a list of the products and product categories covered by all CVE Numbering Authorities (CNAs), including the CVE Program Root CNA.
Each CVE Entry includes appropriate references. Each reference used in CVE (1) identifies the source, (2) includes a well-defined identifier to facilitate searching on a source's website, and (3) notes the associated CVE ID. CVE also includes a Reference Maps page with links to documents from the commonly used information sources that are used as references for CVE Entries.
FAQs from the Frequently Asked Questions page also address specific questions about CVE Entries on the following topics:
To receive a CVE ID for your issue you must contact a CVE Numbering Authority (CNA). See Request a CVE ID for details.
U.S. National Vulnerability Database (NVD)
Launched by the National Institute of Standards and Technology (NIST) in 2005, NVD provides a vulnerability database of enhanced CVE content that is fully synchronized with the CVE List, so any updates to the CVE List appear immediately in NVD.
In addition to advanced searching (e.g., by operating system, etc.), NVD also provides the following enhanced CVE content: