U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

News

Find all the NVD-related news right here.
April 9, 2024 To enable more flexibility within our API output we need to remove certain restrictions from the existing 2.0 API schemas. All existing API users will need to download the latest schema files to avoid validation issues later this year. See /cves/ schema restriction update.
March 5, 2024 As part of ongoing efforts to increase the reliability and general responsiveness of the 2.0 APIs, the NVD will be making a change to the Match Criteria API. See /cpematch/ resultsPerPage update.
February 13, 2024 NIST is working to establish a consortium to improve the NVD program, and there will be some temporary delays in analysis efforts. For more information please review the NVD program transition announcement page.
November 6, 2023 The NVD has transitioned from processing the CVE List 4.0 JSON to the CVE List 5.0 JSON. There are quite a few changes to the NVD dataset as a result of this transition. Please make sure to read the details of these changes at the NVD CVE 4.0 to CVE 5.0 transition page.
January 17, 2023 The 2.0 APIs have exited the open beta period, deprecating the 1.0 APIs. Deprecated APIs do not receive updates or product support. For more information on this release and to learn about upcoming changes please see the change timeline. For more information on how to transition existing processes to the new APIs please see the transition guide.
September 21, 2022 The NVD has released updated versions of its API in an open beta. The open beta is scheduled to run until January 2023, at which point the updated APIs will enter regular production and the 1.0 APIs will be marked deprecated. For more information on this release and to learn about other changes the NVD has planned over the next 24 months please see the change timeline. For more information on how to transition existing processes to the new APIs please see the transition guide.
July 13, 2022 In late 2022 the NVD will release updated versions of its APIs. Approximately 12 months after this release the NVD will retire the current version of its APIs. Approximately 6 months after the release of the new APIs the NVD will retire all RSS feeds. Approximately 12 months after the release of the new APIs the NVD will also retire all remaining data feeds. For more information see the API and Data Feeds announcement.
July 13, 2022 The NVD has added information to its CVE detail pages to identify vulnerabilities appearing in CISA's Known Exploited Vulnerabilities Catalog. Information on exploited vulnerabilities and the affected products will also become available to developers when the NVD releases new APIs in late 2022. Questions about the Known Exploited Vulnerabilities Catalog should be directed to CISA. Questions about the CVE may be directed to the NVD.
July 13, 2022 As of July 13th, 2022, the NVD will no longer generate Vector Strings, Qualitative Severity Ratings, or Severity Scores for CVSS v2.0. Existing CVSS v2 information will remain in the database though it is no longer required for new CVEs. For more information see the CVSS v2 announcement.
July 13, 2022 To aid users with research and reference materials, the NVD has acquired a Distinct Object Identifier (DOI). DOI are persistent, unique identifiers typically used with scholarly articles, books, data sets, and other publications. For information on how to the cite the NVD, including the database's DOI, machine-readable repository metadata, and NIST's Fair Use Statement, please consult NIST's Public Data Repository.
October 21, 2021 NVD API users may obtain an API key that can be included as a URL parameter in API requests. Users who include an API key will see no change in service and may continue to make requests at the current rate. In six months, users making requests without a key will see a reduction in the number of requests they can make each minute. For more information see the API Key announcement.
August 5, 2021 Beginning in October of 2021 both the Vuln and CPE APIs will limit date ranges to 120 days total. In addition, while the date ranges will continue to be an optional parameter for both APIs, it will now be required that both begin and end dates are supplied when in use. Impacts are as follows:
Vuln API modStartDate
modEndDate
Both values will now be required when used. Maximum date ranges between dates cannot exceed 120 days.
pubStartDate
pubEndDate
Both values will now be required when used. Maximum date ranges between dates cannot exceed 120 days.
CPE API modStartDate
modEndDate
Both values will now be required when used. Maximum date ranges between dates cannot exceed 120 days.
July 2, 2021 To satisfy the different needs of the NVD Vuln API user base, the parameter cpeName has been added as an alternative to the current cpeMatchString parameter. Use the cpeName parameter when the CPE URI is known and retrieval of all CVEs attached to that CPE are desired. Use cpeMatchString for a broader search to find CVEs attached to multiple CPEs that match the CPE match string criteria.
June 23, 2021 The National Checklist program content has been moved to https://ncp.nist.gov. This site contains all of the checklist content found at https://checklists.nist.gov as well as the CCE information formerly found within the NVD. This move will allow the expansion of the NCP's capabilities with an additional focus on the mappings of checklist to controls through the use of CCEs.
June 30, 2020 NVD release of the Collaborative Vulnerability Metadata Acceptance Process (CVMAP)
February 10, 2020 New NVD CVE/CPE API and Legacy SOAP Service Retirement
January 1, 2020 2019 in Review
November 7, 2019 CVSS/CWE from CVE List now Supported!
October 16, 2019 Implemented XML Vulnerability Feed Retirement Phase 3
September 9, 2019 NVD CWE Slice Updated!
CVSS v3.1 Official Support!
JSON 1.1 Vulnerability Feed Released!
August 8, 2019 JSON 1.1 Feed and CVSS v3.1 Support announcements
July 22, 2019 CPE Match Feed Released!
July 22, 2019 Implemented XML Vulnerability Feed Retirement Phase 2
April 3, 2019 Updated XML Vulnerability Feeds Retirement Timeline Update
October 30, 2018 JSON 1.0 Data Feed Released!
July 10, 2017 Scheduled maintenance of a large number of vulnerability reference links will appear in the NVD Modified data feeds. This will result in larger than average Modified Feed files. These changes will be staggered in batches with 8 day intervals to avoid extreme impact to downstream consumers of our data. Read more at the MITRE announcement.
July 5, 2017 Revised BETA JSON vulnerability feed schema and BETA JSON feeds based on public comments and feedback.
July 1, 2017 2017 year-to-date number of vulnerabilities analyzed surpassed 2016 total, see the NVD Dashboard page for more information.
April 20, 2017 BETA JSON Vulnerability Feeds Now Available
March 27, 2017 NVD website update goes live
September 30, 2016 Vulntology (NISTIR 8138) draft 1 released
July 5, 2016 NVD CWE slice broadened
June 23, 2016 TLS 1.0 disabled on NVD webservers per M-15-13
February 2, 2016 CVSS v3.0 calculator released
December 20, 2015 NVD begins assessments with CVSS v3.0
September 9, 2015 2015 Cybersecurity Innovation Forum
September 1, 2015 NVD begins support for CVE-ID syntax change
January 28, 2014 2014 Cybersecurity Innovation Forum
October 3, 2012 8th Annual IT Security Automation Conference
October 31, 2011 7th Annual IT Security Automation Conference
August 29, 2011 EMAP Developer Workshop
September 27, 2010 6th Annual IT Security Automation Conference
May 11, 2010 2010 NASA / Army Systems and Software Engineering Forum
April 13, 2010 Security Solutions 2010
March 16, 2010 IT Security Entrepreneurs' Forum
February 22, 2010 Security Automation Developer Days Winter 2010
October 26, 2009 5th Annual IT Security Automation Conference
September 5, 2008 NVD updated to version 2.2
August 18, 2008 OMB has released a new memo relating to FDCC and the SCAP validation program. The memo can be found at: https://georgewbush-whitehouse.archives.gov/omb/memoranda/fy2008/m08-22.pdf
August 11, 2008 Interactive Schema and the Interactive Schema Interpreter is now available through NVD at https://csrc.nist.gov/Projects/Security-Content-Automation-Protocol/Specifications/ocil
Minor update made to FDCC Reporting Format - update pertains to the Schematron Stylesheet, please reference the changelog for details.
Version 1.0.2 of the SCAP Validation Program Derived Test Requirements Document has been released.
January 24, 2008 Free Federal Desktop Core Configuration (FDCC) Implementers Workshop held at NIST. Workshop will address technical aspects of FDCC and corresponding Security Content Automation Protocol (SCAP) updates.
January 21, 2008 XCCDF-based FDCC reporting format has been released. Specification and associated schematron stylesheet can be found at https://nvd.nist.gov/scap/content/fdcc-reporting_20080108.zip
October 16, 2007 The NVD CVSS V2 calculator has been updated to comply with the official CVSS V2 Specification. For more information please see: NVD CVSS
October 12, 2007 The Draft of XCCDF Specification 1.1.4 has been posted to the NVD XCCDF Webpage.
September 27, 2007 NVD is now mapping into a cross section of the Common Weakness Enumeration (CWE). Please see the NVD CWE page for more details.
September 19, 2007 The 3rd Annual IT Security Automation Conference was held at NIST.
August 6, 2007 A U.S. Office of Management and Budget memorandum requires specific secure configuration settings for Microsoft operating systems and requires use of SCAP validated tools to monitor system configurations over time.
August 6, 2007 The Payment Card Industry Data Security Standard requires use of NVD Common Vulnerability Scoring System assessments for use within approved scanning vendor tools.
July 27, 2007 The National Vulnerability Database announces support for the Common Platform Enumeration (CPE) standard for vendor and product naming version 2.0.
June 20, 2007 The National Vulnerability Database deployed support for the Common Vulnerability Scoring System (CVSS) .
May 22, 2007 The National Vulnerability Database upgraded to version 2.0. NIST Checklist Program moved within NVD.
Plans for the 3rd Annual Security Automation Conference and Workshop to be held Sept 19th & 20th, 2007 are under way.
May 9, 2007 Released Windows XP Professional beta version 7 security automation files
April 13, 2007 Released Windows 2000 Professional security automation files beta version 1 (XCCDF skeleton and patch content)
April 5, 2007 Released Microsoft Internet Explorer Version 7.0 security automation files beta version 8
April 5, 2007 Released Windows Vista security automation files version 5.0
April 4, 2007 Released Windows 2003 Server security automation files version 2.0
March 28, 2007 Released Microsoft Office 2007 security automation files beta version 4
March 27, 2007 Released Symantec Antivirus security automation files beta version 2
Created September 20, 2022 , Updated March 19, 2024