Hologic is now a CVE Numbering Authority assigning CVE IDs for Hologic products https://lnkd.in/etWAMK-5 #cve #cna #vulnerability #vulnerabilitymanagement #cybersecurity
About us
On this page we hope to establish a dialogue and get your input on issues and topics important to CVE™ and CWE™. Follow us: @CVEannounce, @CVEnew, and @cwecapec on X/Twitter and @CVE_Program and @CWE_Program on Mastodon.
- Website
-
https://www.cve.org/About/RelatedEfforts#CWE
External link for CVE | CWE
- Industry
- Computer and Network Security
- Company size
- 5,001-10,000 employees
- Founded
- 1999
Updates
-
150 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of May 11, 2026 https://lnkd.in/ex-EKW-q #cve #cveid #cvss #cwe #vulnerabilitymanagement #vulnerability #hssedi #cisa
-
1,667 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of May 4, 2026 https://lnkd.in/e59NGe8f #cve #cveid #cvss #cwe #vulnerabilitymanagement #vulnerability #hssedi #cisa
-
Learn @ the #CWE Top 25, it’s value to defenders, & how #CVE CNAs helped create the 2025 list; purpose & benefits of mapping the root causes of vulnerabilities identified in CVE Records to CWE #weaknesses; root cause mapping tips; & much more! https://lnkd.in/eUEHXbde
CWE Top 25 Most Dangerous Software Weaknesses
https://www.youtube.com/
-
Hardware #CWE SIG members—Reminder that our next meeting is Friday, 5/15/2026, at 12:30-1:30 PM EST (16:30 – 17:30 UTC) Topic: - Defining relationships between HW CWEs - Community topics Join #HW SIG: http://bit.ly/3SCkqyk
-
New on the CVE Blog: “CVE Program Report for Quarter 1 Calendar Year (Q1 CY) 2026” https://lnkd.in/e6JvFAQr #cve #vulnerability #vulnerabilitymanagement #infosec #cybersecurity
-
-
New on the CVE Blog: “CVE Program Report for Quarter 1 Calendar Year (Q1 CY) 2026” https://lnkd.in/e6JvFAQr #cve #vulnerability #vulnerabilitymanagement #infosec #cybersecurity
-
-
BAE Systems, Inc. is now a CVE Numbering Authority assigning CVE IDs for all products of BAE Systems https://lnkd.in/exaSEtP3 #cve #cna #vulnerability #vulnerabilitymanagement #cybersecurity
-
-
“CWE REST API” updated to the CWE Version 4.20 release The API, which requires no sign up or credentials, is an easy & efficient way to stay up to date with #CWE content as it’s always up to date when requested by downstream applications Details: https://lnkd.in/ecvrEj35
-
CVE | CWE reposted this
A proud day for our team at the European Union Agency for Cybersecurity (ENISA) 🇪🇺 Today, we welcomed the first four #CVE Numbering Authorities (CNA) onboarded and trained under #ENISA Root — an important milestone as #Europe strengthens its operational contribution to the global CVE Program. This comes in addition to the European CNAs already beginning their transition to ENISA Root, helping build a more coordinated, timely, and reliable approach to vulnerability handling across the #EU. What makes this especially exciting is that this is not just about growth in numbers. It is about building real operational capacity in Europe, in close coordination with EU CSIRTs, European CNAs, and the wider #vulnerabilitymanagement community (especially grateful for the continuous support from the Cybersecurity and Infrastructure Security Agency & MITRE), to reinforce the interoperability of the global vulnerability backbone that defenders, vendors, and researchers rely on every day. This is only the beginning, and I could not be prouder of the colleagues and CVE partners making it happen 🚀🇪🇺 #Cybersecurity #VulnerabilityManagement #CVEProgram #ENISA #CVD Special thanks for the unwavering support to Hans de Vries, Laura Heuvinck, Stefano De Crescenzo, ENISA IVS team (with no LinkedIn profiles😜), Lindsey C., Kevin Donovan, Rachel G., Alec Summers
🚀 ENISA expands its CVE Root role with four new CNAs Today, four organisations have newly joined the Common Vulnerabilities and Exposures (CVE™) Program as CVE Numbering Authorities (CNAs) under ENISA Root. All were trained and onboarded by ENISA. In total, seven CNAs have now moved from MITRE Root to ENISA Root, alongside the four new CNAs joining the programme. ENISA acts as CVE Root for European entities within its scope, including vulnerabilities discovered by or reported to EU CSIRTs. This helps improve how vulnerabilities are identified, assigned, and communicated across Europe. Several more organisations are expected to join in the coming weeks. 🔗 Find out more: https://lnkd.in/dUNeRubB
-