#CVE Program Expands Partnership with European Union Agency for Cybersecurity (ENISA)— #ENISA Is Now a Root in the CVE Program https://lnkd.in/eUZdiq9V #Vulnerability #InformationTechnology #Cybersecurity
About us
On this page we hope to establish a dialogue and get your input on issues and topics important to CVE™ and CWE™. Follow us: @CVEannounce, @CVEnew, and @cwecapec on X/Twitter and @CVE_Program and @CWE_Program on Mastodon.
- Website
-
https://www.cve.org/About/RelatedEfforts#CWE
External link for CVE | CWE
- Industry
- Computer and Network Security
- Company size
- 5,001-10,000 employees
- Founded
- 1999
Updates
-
CVE | CWE reposted this
Transparency is strength – not risk. From the defender perspective, the CVE Program offers actionable vulnerability intelligence from a federated set of participants, with a breadth and depth of coverage that is stronger than ever. In building this out, there are occasional instances in which the data stream is imperfect, and a brief explanation here may help in reducing frustration and better understanding the value proposition. Today, vulnerability information availability to assist defenders is bifurcated across two groups of providers. The first type is information from the Supplier, who has the best information for vulnerability determination and details. The second type is information from third parties, which serves as a valuable early warning system to fill the coverage gap (as it is inherently infeasible for every Supplier to have a mature VM process at every point in time). Sometimes Suppliers worry about a CVE ID assignment and CVE Record publication for a vulnerability in their product. The concern is understandable: no one wants their product associated with a security flaw. But when it is, coordination and transparency with detailed information from the supplier demonstrates mature security operations and makes the ecosystem strong. CVE Records are a critical part of how the community coordinates defense. They help make issues trackable across the many tools, teams, and environments that depend on them. Publishing a CVE isn’t about blame… it’s about responsibility and trust. But what happens when there are disagreements? The CVE Program’s Policy and Procedure for Disputing a CVE Record (updated earlier this year) outlines the process for handling disagreements about the existence of, or content within, a CVE Record. You can read it here: https://lnkd.in/ePr_dpmc Part of the role of the Dispute Policy is to enable community feedback on cases where the early warning system has gone awry. I am a part of many conversations on this and other challenges defenders face. This, and all CVE Program policies are living documents that can be updated to provide greater value to the downstream user community. If you have thoughts about how we could make this better, we’d love to hear from you! #CVE #VulnerabilityManagement #Transparency #Cybersecurity #CollectiveDefense
-
-
Call for Papers for “CVE/FIRST VulnCon 2026” open until December 22, 2025 Early registration, both virtual and in-person, is open https://lnkd.in/gqfB6PBp #CVE #FIRST #VulnerabilityManagement #Vulnerability #Infosec #Cybersecurity
-
-
New on the #CVE Blog: “Videos from “CVE Program Technical Workshop 2025” Now Available” https://lnkd.in/efifUtgb #Vulnerability #VulnerabilityManagement #InformationSecurity #Cybersecurity
-
-
#CWE User Experience Working Group (UEWG) members — Reminder that our next meeting is Wednesday, 11/19/2025, at 12:00-1:00PM EST Topic: - CWE Corpus Completeness Join CWE UEWG: https://bit.ly/3CIylfz
-
CVE | CWE reposted this
The new OWASP Top 10 (2025 Release Candidate) reaffirms a powerful truth: lasting security comes from addressing root causes, not just symptoms. Across its updated categories – from Broken Access Control to the newly expanded Software Supply Chain Failures – OWASP continues to emphasize the Common Weakness Enumeration (CWE) identifiers that lie beneath each risk. Those CWEs are where prevention begins. When organizations use CWE as a shared language for software design, testing, and procurement, they move from reacting to vulnerabilities to preventing their introduction in the first place. That’s the foundation for building safer systems – and for governing software risk responsibly at scale. Explore how the OWASP Top 10 and CWE work together to strengthen the ecosystem: https://lnkd.in/e2Bb5T36 Wanna learn more about cybersecurity weaknesses and prevent vulnerabilities from happening? Learn more: https://cwe.mitre.org #ApplicationSecurity #OWASPTop10 #CWE #SoftwareSecurity #Cybersecurity
-
-
Hardware #CWE SIG members—Reminder that our next meeting is Friday, 11/14/2025, at 12:30-1:30 PM EST (16:30 – 17:30 UTC) Topic: - Review: “Formation of RTL Weakness Ad-Hoc Working Group” Join #HW SIG: http://bit.ly/3SCkqyk
-
“CVE/FIRST VulnCon 2026” — Early Registration & Call for Papers NOW OPEN! We look forward to seeing you at this annual community event & encourage you to register today! Call for Papers closes on December 22, 2025. https://lnkd.in/ghufRB54 #CVE #FIRST #VulnerabilityManagement #Vulnerability #Infosec #Cybersecurity
-
-
NetScaler is now a CVE Numbering Authority (CNA) assigning CVE IDs for NetScaler issues only https://lnkd.in/eM2KxP54 #CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity
-
-
2N is now a CVE Numbering Authority (CNA) assigning CVE IDs for all products of 2N Telekomunikace a.s. including end-of-life/end-of-service products https://lnkd.in/e89-WgKS #CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity
-