Find all the NVD-related news right here.
August 12, 2024 | Throughout the week of August 12 -16, 2024, NVD’s servers will be undergoing maintenance by NIST. There is a possibility that there will be sporadic interruptions in NVD service, lasting until 6:00 PM on August 16, 2024. | ||||||||
---|---|---|---|---|---|---|---|---|---|
July 18, 2024 | We are currently updating our servers, so users may experience temporary delays or usability issues beginning around 11:00 AM on Thursday, July 18, 2024. We expect our systems to be back to normal by 3:00 PM ET on the same day. | ||||||||
July 2, 2024 | NIST has made recent updates to improve functionality of the NVD. We are aware of availability issues with the NVD API Endpoints and are working to resolve them. If you are experiencing schema validation errors, please ensure that you or the tools you use have the latest schema files, which were recently updated. Stability should return once users make these updates and implement best practices to reduce unnecessary request volume. The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity. CVSS version 4.0 is the next generation of the Common Vulnerability Scoring System standard; released November 1, 2023. CVSS v4.0 provides increased granularity for Base metrics, a new Supplemental metric group, a different methodology for determining severity and more. For more information regarding CVSS v4.0 please visit https://www.first.org/cvss/v4.0/specification-document. CVSS v4.0 information will be displayed throughout the NVD website: Vulnerability Detail Pages The Metrics section of the Vulnerability detail pages will now contain CVSS v4.0 data when available. CVSS v4.0 data will be displayed in a similar fashion to CVSS v3.x and CVSS v2.0 and will be displayed if available through NVD enrichment or CVE Program related CNA and/or ADP contributions. CVSS v4.0 Calculator A CVSS v4.0 Calculator (based on the one provided by the FIRST CVSS SIG) has been included on the website. While visually distinct from previous calculators, the same functionality exists when including CVE IDs or CVSS vector string parameters in the URL to the page (See Calculator Product Integration). Vulnerability Search Form The advanced section of the vulnerability search page has been updated to allow searching by CVSS v4.0 criteria. Vulnerability Search Results The search results will now include CVSS v4.0 badges when appropriate. For questions and concerns, please contact nvd [at] nist.gov (nvd[at]nist[dot]gov). CISA Authorized Data Publisher (ADP) Support As of July 3, 2024, the NVD will support inclusion of data from CISA’s Vulnrichment CVSS and CWE information. The Vulnrichment data will now be displayed on the vulnerability detail pages and attributed to the CISA-ADP (Authorized Data Publisher) source along with any relevant CVSS data contributed by NVD enrichment efforts or CNAs. This information can also be accessed using the NVD 2.0 APIs! The CVSS information can be located within the metrics object and the CWE information can be found within weaknesses array. No schema changes were necessary to support this update. Note: The legacy data feed files will not contain the Vulnrichment information. For questions and concerns, please contact nvd [at] nist.gov (nvd[at]nist[dot]gov). | ||||||||
May 29, 2024 | NIST has awarded a contract for additional processing support for incoming Common Vulnerabilities and Exposures (CVEs) for inclusion in the National Vulnerability Database. We are confident that this additional support will allow us to return to the processing rates we maintained prior to February 2024 within the next few months. In addition, a backlog of unprocessed CVEs has developed since February. NIST is working with the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to facilitate the addition of these unprocessed CVEs to the NVD. We anticipate that that this backlog will be cleared by the end of the fiscal year. As we shared earlier, NIST is also working on ways to address the increasing volume of vulnerabilities through technology and process updates. Our goal is to build a program that is sustainable for the long term and to support the automation of vulnerability management, security measurement and compliance. With a 25-year history of providing this database of vulnerabilities to users around the world and given that we do not play an enforcement or oversight role, NIST is uniquely suited to manage the NVD. NIST is fully committed to maintaining and modernizing this important national resource that is vital to building and maintaining trust in information technology and fostering innovation. Moving forward, we will keep the community informed of our progress toward normal operational levels and our future modernization plans. | ||||||||
May 20, 2024 | On May 8, 2024, the Common Vulnerabilities and Exposures (CVE) program deployed support for the CVE 5.1 record format. Once the deployment started, NIST was not able to process records with the new format until we released a subsequent deployment for NVD-related systems on May 14, 2024. We are now ingesting both CVE 5.0 and CVE 5.1 records into the NVD dataset on an hourly basis and we’re working as fast as we can to return to normal processing. | ||||||||
April 25, 2024 | NIST maintains the National Vulnerability Database (NVD), a repository of information on software and hardware flaws that can compromise computer security. This is a key piece of the nation’s cybersecurity infrastructure. There is a growing backlog of vulnerabilities submitted to the NVD and requiring analysis. This is based on a variety of factors, including an increase in software and, therefore, vulnerabilities, as well as a change in interagency support. Currently, we are prioritizing analysis of the most significant vulnerabilities. In addition, we are working with our agency partners to bring on more support for analyzing vulnerabilities and have reassigned additional NIST staff to this task as well. We are also looking into longer-term solutions to this challenge, including the establishment of a consortium of industry, government, and other stakeholder organizations that can collaborate on research to improve the NVD. NIST is committed to its continued support and management of the NVD. Currently, we are focused on our immediate plans to address the CVE backlog, but plan to keep the community posted on potential plans for the consortium as they develop. For questions and concerns, you can contact nvd [at] nist.gov (nvd[at]nist[dot]gov). | ||||||||
April 9, 2024 | To enable more flexibility within our API output we need to remove certain restrictions from the existing 2.0 API schemas. All existing API users will need to download the latest schema files to avoid validation issues later this year. See /cves/ schema restriction update. | ||||||||
March 5, 2024 | As part of ongoing efforts to increase the reliability and general responsiveness of the 2.0 APIs, the NVD will be making a change to the Match Criteria API. See /cpematch/ resultsPerPage update. | ||||||||
February 13, 2024 | NIST is working to establish a consortium to improve the NVD program, and there will be some temporary delays in analysis efforts. For more information please review the NVD program transition announcement page. | ||||||||
November 6, 2023 | The NVD has transitioned from processing the CVE List 4.0 JSON to the CVE List 5.0 JSON. There are quite a few changes to the NVD dataset as a result of this transition. Please make sure to read the details of these changes at the NVD CVE 4.0 to CVE 5.0 transition page. | ||||||||
January 17, 2023 | The 2.0 APIs have exited the open beta period, deprecating the 1.0 APIs. Deprecated APIs do not receive updates or product support. For more information on this release and to learn about upcoming changes please see the change timeline. For more information on how to transition existing processes to the new APIs please see the transition guide. | ||||||||
September 21, 2022 | The NVD has released updated versions of its API in an open beta. The open beta is scheduled to run until January 2023, at which point the updated APIs will enter regular production and the 1.0 APIs will be marked deprecated. For more information on this release and to learn about other changes the NVD has planned over the next 24 months please see the change timeline. For more information on how to transition existing processes to the new APIs please see the transition guide. | ||||||||
July 13, 2022 | In late 2022 the NVD will release updated versions of its APIs. Approximately 12 months after this release the NVD will retire the current version of its APIs. Approximately 6 months after the release of the new APIs the NVD will retire all RSS feeds. Approximately 12 months after the release of the new APIs the NVD will also retire all remaining data feeds. For more information see the API and Data Feeds announcement. | ||||||||
July 13, 2022 | The NVD has added information to its CVE detail pages to identify vulnerabilities appearing in CISA's Known Exploited Vulnerabilities Catalog. Information on exploited vulnerabilities and the affected products will also become available to developers when the NVD releases new APIs in late 2022. Questions about the Known Exploited Vulnerabilities Catalog should be directed to CISA. Questions about the CVE may be directed to the NVD. | ||||||||
July 13, 2022 | As of July 13th, 2022, the NVD will no longer generate Vector Strings, Qualitative Severity Ratings, or Severity Scores for CVSS v2.0. Existing CVSS v2 information will remain in the database though it is no longer required for new CVEs. For more information see the CVSS v2 announcement. | ||||||||
July 13, 2022 | To aid users with research and reference materials, the NVD has acquired a Distinct Object Identifier (DOI). DOI are persistent, unique identifiers typically used with scholarly articles, books, data sets, and other publications. For information on how to the cite the NVD, including the database's DOI, machine-readable repository metadata, and NIST's Fair Use Statement, please consult NIST's Public Data Repository. | ||||||||
October 21, 2021 | NVD API users may obtain an API key that can be included as a URL parameter in API requests. Users who include an API key will see no change in service and may continue to make requests at the current rate. In six months, users making requests without a key will see a reduction in the number of requests they can make each minute. For more information see the API Key announcement. | ||||||||
August 5, 2021 | Beginning in October of 2021 both the Vuln and CPE APIs will limit date ranges to 120 days total. In addition, while the date ranges will continue to be an optional parameter for both APIs, it will now be required that both begin and end dates are supplied when in use. Impacts are as follows:
| ||||||||
July 2, 2021 | To satisfy the different needs of the NVD Vuln API user base, the parameter cpeName has been added as an alternative to the current cpeMatchString parameter. Use the cpeName parameter when the CPE URI is known and retrieval of all CVEs attached to that CPE are desired. Use cpeMatchString for a broader search to find CVEs attached to multiple CPEs that match the CPE match string criteria. | ||||||||
June 23, 2021 | The National Checklist program content has been moved to https://ncp.nist.gov. This site contains all of the checklist content found at https://checklists.nist.gov as well as the CCE information formerly found within the NVD. This move will allow the expansion of the NCP's capabilities with an additional focus on the mappings of checklist to controls through the use of CCEs. | ||||||||
June 30, 2020 | NVD release of the Collaborative Vulnerability Metadata Acceptance Process (CVMAP) | ||||||||
February 10, 2020 | New NVD CVE/CPE API and Legacy SOAP Service Retirement | ||||||||
January 1, 2020 | 2019 in Review | ||||||||
November 7, 2019 | CVSS/CWE from CVE List now Supported! | ||||||||
October 16, 2019 | Implemented XML Vulnerability Feed Retirement Phase 3 | ||||||||
September 9, 2019 | NVD CWE Slice Updated! CVSS v3.1 Official Support! JSON 1.1 Vulnerability Feed Released! | ||||||||
August 8, 2019 | JSON 1.1 Feed and CVSS v3.1 Support announcements | ||||||||
July 22, 2019 | CPE Match Feed Released! | ||||||||
July 22, 2019 | Implemented XML Vulnerability Feed Retirement Phase 2 | ||||||||
April 3, 2019 | Updated XML Vulnerability Feeds Retirement Timeline Update | ||||||||
October 30, 2018 | JSON 1.0 Data Feed Released! | ||||||||
July 10, 2017 | Scheduled maintenance of a large number of vulnerability reference links will appear in the NVD Modified data feeds. This will result in larger than average Modified Feed files. These changes will be staggered in batches with 8 day intervals to avoid extreme impact to downstream consumers of our data. Read more at the MITRE announcement. | ||||||||
July 5, 2017 | Revised BETA JSON vulnerability feed schema and BETA JSON feeds based on public comments and feedback. | ||||||||
July 1, 2017 | 2017 year-to-date number of vulnerabilities analyzed surpassed 2016 total, see the NVD Dashboard page for more information. | ||||||||
April 20, 2017 | BETA JSON Vulnerability Feeds Now Available | ||||||||
March 27, 2017 | NVD website update goes live | ||||||||
September 30, 2016 | Vulntology (NISTIR 8138) draft 1 released | ||||||||
July 5, 2016 | NVD CWE slice broadened | ||||||||
June 23, 2016 | TLS 1.0 disabled on NVD webservers per M-15-13 | ||||||||
February 2, 2016 | CVSS v3.0 calculator released | ||||||||
December 20, 2015 | NVD begins assessments with CVSS v3.0 | ||||||||
September 9, 2015 | 2015 Cybersecurity Innovation Forum | ||||||||
September 1, 2015 | NVD begins support for CVE-ID syntax change | ||||||||
January 28, 2014 | 2014 Cybersecurity Innovation Forum | ||||||||
October 3, 2012 | 8th Annual IT Security Automation Conference | ||||||||
October 31, 2011 | 7th Annual IT Security Automation Conference | ||||||||
August 29, 2011 | EMAP Developer Workshop | ||||||||
September 27, 2010 | 6th Annual IT Security Automation Conference | ||||||||
May 11, 2010 | 2010 NASA / Army Systems and Software Engineering Forum | ||||||||
April 13, 2010 | Security Solutions 2010 | ||||||||
March 16, 2010 | IT Security Entrepreneurs' Forum | ||||||||
February 22, 2010 | Security Automation Developer Days Winter 2010 | ||||||||
October 26, 2009 | 5th Annual IT Security Automation Conference | ||||||||
September 5, 2008 | NVD updated to version 2.2 | ||||||||
August 18, 2008 | OMB has released a new memo relating to FDCC and the SCAP validation program. The memo can be found at: https://georgewbush-whitehouse.archives.gov/omb/memoranda/fy2008/m08-22.pdf | ||||||||
August 11, 2008 | Interactive Schema and the Interactive Schema Interpreter is now available through NVD at https://csrc.nist.gov/Projects/Security-Content-Automation-Protocol/Specifications/ocil Minor update made to FDCC Reporting Format - update pertains to the Schematron Stylesheet, please reference the changelog for details. Version 1.0.2 of the SCAP Validation Program Derived Test Requirements Document has been released. | ||||||||
January 24, 2008 | Free Federal Desktop Core Configuration (FDCC) Implementers Workshop held at NIST. Workshop will address technical aspects of FDCC and corresponding Security Content Automation Protocol (SCAP) updates. | ||||||||
January 21, 2008 | XCCDF-based FDCC reporting format has been released. Specification and associated schematron stylesheet can be found at https://nvd.nist.gov/scap/content/fdcc-reporting_20080108.zip | ||||||||
October 16, 2007 | The NVD CVSS V2 calculator has been updated to comply with the official CVSS V2 Specification. For more information please see: NVD CVSS | ||||||||
October 12, 2007 | The Draft of XCCDF Specification 1.1.4 has been posted to the NVD XCCDF Webpage. | ||||||||
September 27, 2007 | NVD is now mapping into a cross section of the Common Weakness Enumeration (CWE). Please see the NVD CWE page for more details. | ||||||||
September 19, 2007 | The 3rd Annual IT Security Automation Conference was held at NIST. | ||||||||
August 6, 2007 | A U.S. Office of Management and Budget memorandum requires specific secure configuration settings for Microsoft operating systems and requires use of SCAP validated tools to monitor system configurations over time. | ||||||||
August 6, 2007 | The Payment Card Industry Data Security Standard requires use of NVD Common Vulnerability Scoring System assessments for use within approved scanning vendor tools. | ||||||||
July 27, 2007 | The National Vulnerability Database announces support for the Common Platform Enumeration (CPE) standard for vendor and product naming version 2.0. | ||||||||
June 20, 2007 | The National Vulnerability Database deployed support for the Common Vulnerability Scoring System (CVSS) . | ||||||||
May 22, 2007 | The National Vulnerability Database upgraded to version 2.0. NIST Checklist Program moved within NVD. Plans for the 3rd Annual Security Automation Conference and Workshop to be held Sept 19th & 20th, 2007 are under way. | ||||||||
May 9, 2007 | Released Windows XP Professional beta version 7 security automation files | ||||||||
April 13, 2007 | Released Windows 2000 Professional security automation files beta version 1 (XCCDF skeleton and patch content) | ||||||||
April 5, 2007 | Released Microsoft Internet Explorer Version 7.0 security automation files beta version 8 | ||||||||
April 5, 2007 | Released Windows Vista security automation files version 5.0 | ||||||||
April 4, 2007 | Released Windows 2003 Server security automation files version 2.0 | ||||||||
March 28, 2007 | Released Microsoft Office 2007 security automation files beta version 4 | ||||||||
March 27, 2007 | Released Symantec Antivirus security automation files beta version 2 |