Table of Contents
  • Home
  • /
  • Blog
  • /
  • 6 Powerful Vulnerability Databases to Search Publicly Disclosed Security Vulnerabilities
November 20, 2023
|
47m

6 Powerful Vulnerability Databases to Search Publicly Disclosed Security Vulnerabilities


6 Powerful Vulnerability Databases To Search Publicly Disclosed Security Vulnerabilities

In today’s digital world, the necessity to secure valuable data and information is more important than ever. As more businesses and individuals rely on technological advancements, the risks associated with vulnerabilities within systems and applications increase. To address these risks, it’s crucial to be aware of publicly disclosed security vulnerabilities that may affect your systems or software. This knowledge allows organizations and individuals to be proactive in protecting their digital assets and ensuring overall security.

One way to stay informed about these security vulnerabilities is through vulnerability databases. These databases serve as comprehensive resources that catalog publicly disclosed cybersecurity vulnerabilities in a standardized format, making it easier for individuals and professionals to search, use, and incorporate the information into their security measures. With a wide range of databases available, it’s essential to identify the most powerful and reputable ones to assist you in staying up-to-date with the latest vulnerabilities and securing your systems against potential threats.

In this article, we explore six powerful vulnerability databases that provide valuable information on publicly disclosed security vulnerabilities. These databases cater to a wide range of users, from security experts to general IT professionals, ensuring comprehensive coverage of the most relevant and up-to-date security vulnerabilities.

But, before we directly land on the list of powerful vulnerability databases, let’s learn abut these additional things. It’s not mandatory for everybody to read. However, it is for those who want comprehensive information about the Vulnerability Management and Vulnerability Database.

In this comprehensive blog post, we will cover the following topics:

  • What are security vulnerabilities and how they are tracked

  • Understanding CVE IDs, CVSS scoring system, and vectors

  • Introduction to CVE Numbering Authorities (CNAs)

  • Where to search publicly disclosed vulnerabilities

  • List of powerful vulnerability databases

Let’s get started!

What are Security Vulnerabilities? And How Security Vulnerabilities Are Being Tracked?

Security vulnerabilities are flaws or weaknesses in software code or system configurations that can be exploited by attackers to gain unauthorized access to a system or network. Once inside, attackers can leverage authorizations and privileges to compromise systems and assets. Vulnerabilities can be found in IT, network, cloud, web, and mobile application systems.

Some examples of vulnerabilities include:

  • Buffer overflows

  • SQL injection flaws

  • Cross-site scripting bugs

  • Default or weak passwords

  • Race conditions

Vulnerabilities are tracked and documented in databases so that affected vendors, manufacturers, and users are aware of the issue and can take action to remediate or mitigate the vulnerability.

Common practices for vulnerability tracking include:

  • Reporting: Security researchers and users submit newly discovered vulnerabilities to vendors, CERTs, or public vulnerability databases.

  • Assignment of CVE ID: Once a vulnerability report is verified, it is assigned a CVE ID (Common Vulnerabilities and Exposures) for unique identification.

  • Publication: Details of vulnerability are publicly documented in databases like National Vulnerability Database (NVD).

  • Severity analysis: The vulnerability severity is scored using the Common Vulnerability Scoring System (CVSS).

  • Remediation tracking: The fix status of the vulnerability is updated over time.

Thorough vulnerability tracking and robust databases allow the security community to assess the risk posed by flaws and prioritize remediation efforts.

The Vulnerability Management team plays a crustal role in identifying, analyzing, assessing, reporting, and mitigating security vulnerabilities before they can be exploited by attackers. So collected or reported vulnerabilities are recorded or stored in several databases by assigning them a CVE ID. This is how the concept of the Vulnerability Database begins. Before we go further, let’s understand a few more concepts like CVE ID, CVSS Scoring System, And Vectors of CVSS.

Understand CVE ID, CVSS Scoring System, And Vectors of CVSS

When dealing with publicly disclosed security vulnerabilities, it is essential to understand the Common Vulnerabilities and Exposures (CVE) identification, the Common Vulnerability Scoring System (CVSS), and the CVSS vectors. This understanding helps you evaluate the severity of vulnerabilities and prioritize your response.

CVE ID

CVE stands for Common Vulnerabilities and Exposures. It is a unique ID assigned to identify each publicly known security vulnerability.

The CVE ID consists of the following format:

CVE-YYYY-NNNNN

Where:

  • CVE – Constant identifier showing this is a CVE ID

  • YYYY – The year the CVE ID was assigned

  • NNNNN – A unique 5-digit number to identify the specific vulnerability

For example, CVE-2019-19781 was assigned in 2019 and has a unique 5-digit ID of 19781.

Once a vulnerability has been publicly documented and verified, it is added to the CVE master list, formally known as Vulnerability Database. The CVE ID helps to eliminate confusion by allowing all parties to refer to vulnerabilities in a standardized manner.

CVSS Scoring System

The Common Vulnerability Scoring System (CVSS) is an open framework used to quantify the severity of IT vulnerabilities. CVSS assigns a numeric score ranging from 0 to 10 to vulnerabilities, with 10 being the most severe.

The CVSS score represents the ease and impact of exploitation. The metrics used to calculate the score are divided into three metric groups:

Base – Represents the intrinsic characteristics of a vulnerability that do not change over time or user environments. This consists of:

  • Attack Vector (AV) – How the vulnerability can be exploited e.g. network, adjacent, local, physical.

  • Attack Complexity (AC) – The complexity of the attack required to exploit the vulnerability.

  • Privileges Required (PR) – The level of privileges required for an attacker to exploit the flaw.

  • User Interaction (UI) – If user interaction is required to exploit the vulnerability.

  • Scope (S) – If a vulnerability in one component impacts resources beyond its security scope.

  • Confidentiality (C), Integrity (I), Availability (A) Impact – The impact of CIA security principles if a vulnerability is exploited.

Temporal – Represents the characteristics of a vulnerability that may change over time but not user environments. This consists of:

  • Exploit Code Maturity (E) – Reflects the maturity of available exploit code.

  • Remediation Level (RL) – Represents the degree to which a vulnerability can be mitigated through fixes, patches, upgrades, etc.

  • Report Confidence (RC) – Reflects the degree of confidence in the existence of the vulnerability and the credibility of the known technical details.

Environmental – Represents the characteristics of a vulnerability that are relevant and unique to a particular user’s environment. This consists of:

  • Collateral Damage Potential (CDP) – The potential for loss of data assets, productivity or revenue if a vulnerability is exploited.

  • Target Distribution (TD) – The number of vulnerable systems that exist in the wild.

  • Security Requirements (CR, IR, AR) – The security requirements for confidentiality, integrity and availability in the user environment.

Using these metrics, CVSS applies a complex calculation to determine the final vulnerability severity score.

Vectors of CVSS

CVSS vectors are a standardized text representation of the metrics used to score a vulnerability.

The vector string contains each metric acronym, followed by the assigned value. For example:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

This vector shows:

  • CVSS version 3.1

  • Attack vector is Network (N)

  • Attack complexity is Low (L)

  • No privileges required (N)

  • No user interaction (N)

  • The scope is Unchanged (U)

  • High impact scores for confidentiality, integrity, availability (H)

The vector highlights the key metrics used to calculate the overall CVSS score for a vulnerability. It provides an easy way for humans to understand the rating factors at a glance.

A Short Introduction to CVE Numbering Authority (CNA)

The next question comes in who assigns the CVE IDs to the vulnerabilities and adds them to the database? The answer is CVE Numbering Authority (CNA). CNAs are organizations that have been authorized by the CVE Program to assign CVE identifiers to vulnerabilities affecting products within their agreed-upon scope. These organizations play a crucial role in ensuring that newly discovered vulnerabilities are assigned unique identifiers and properly documented for the public.

A CNA is responsible for establishing the scope of their authority, determining if a vulnerability falls within this scope, and assigning a unique CVE identifier to the vulnerability before its first public announcement. The CNA’s domain of authority can be specific to its own products or cover a broader range of products and vulnerabilities under its scope. Cooperation between CNAs ensures consistency and accuracy in the enumeration and documentation of vulnerabilities.

The CNA Rules provide guidelines for the assignment and management of CVE identifiers by CNAs. These rules outline the responsibilities and requirements for CNAs, including scope definition, vulnerability discovery and reporting, and proper documentation of vulnerabilities in the CVE List.

There are distinct levels in the CNA hierarchy: Root, Top-Level Root, CNA of Last Resort (CNA-LR), and Sub-CNAs. The most common and basic level of CNA is the Sub-CNA, which assigns CVE identifiers to vulnerabilities specifically within their domain of responsibility. CNAs work together with other CNAs, higher-level CNAs, and the CVE Program to maintain an efficient and streamlined CVE assignment process.

The role of CNAs includes:

  • Receiving vulnerability reports from researchers, vendors, etc.

  • Verifying reports and ensuring they represent distinct vulnerabilities warranting a CVE ID.

  • Assigning a CVE ID from their unique block.

  • Notifying the vulnerability submitter about the assigned CVE ID.

  • Publishing CVE details to databases like NVD, their own security advisories, etc.

  • Updating CVE information and notifying affected parties as more details become available.

CNAs are a vital part of the CVE ecosystem. They enable coordinated, reliable assignment of IDs across the rapidly evolving threat landscape. Currently, there are 307 CNAs (305 CNAs and 2 CNA-LRs) from 36 countries participating in the CVE Program.

CNA Partners By Country (Source: cve.org)

Where do You Search for Publicly Disclosed Security Vulnerabilities?

There are several reputable databases that can be utilized to search for publicly disclosed security vulnerabilities. One of the most notable is the CVE List, a comprehensive catalog of publicly disclosed cybersecurity vulnerabilities managed by the CVE Numbering Authorities (CNAs). The CVE List is free to search, use, and incorporate into products and services. Organizations and security professionals rely on these resources to find details of known weaknesses impacting the products or technologies present in their environment.

Some places where publicly disclosed vulnerabilities can be searched include:

  • National Vulnerability Database (NVD) – Extensive CVE vulnerability database maintained by NIST, based on CVE List feed. Integrates with CVSS and CPE.

  • MITRE CVE List – Comprehensive list of CVE Records provided by MITRE.

  • US-CERT Vulnerability Notes Database – Contains disclosure records published by CISA.

  • Vulnerability search on vendor/manufacturer websites – Companies like Microsoft, Adobe, Cisco etc. provide vulnerability search capabilities on their own websites. Useful for product-specific flaws.

  • Vulnerability databases – Resources like VulnDB, Vulners, Secunia Research Community etc. provide CVE vulnerability data. Some integrate exploit and patch info.

  • Bug bounty platforms – Bugcrowd, HackerOne, etc. include limited vulnerability details disclosed through their bug bounty programs.

  • GIT repositories – Many security tools and projects provide vulnerability data in GIT repositories that can be searched.

  • Exploit databases – Sites like Exploit-DB contain proof-of-concept exploits that can reveal related vulnerabilities.

  • Search engines – Google hacking for specific keywords can reveal security advisories and vulnerability reports.

This list provides a starting point on where security practitioners can search for vulnerability data pertinent to the systems and software relevant to their organization.

List of Powerful Vulnerability Databases

Now,, it’s time to take a deeper look into some of the most comprehensive and widely used public vulnerability databases that can be leveraged to streamline vulnerability management programs.

cve.org

CVE (Common Vulnerabilities and Exposures) is an international, community-driven security vulnerability database, which is maintained by the MITRE Corporation and funded by the Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. Department of Homeland Security.

The website cve.org serves as a public platform that allows users to freely search, use, and incorporate information into their products and services. Each CVE Identifier, or CVE ID, includes a description of the vulnerability or exposure, and reference information from vulnerability reports and advisories. It’s important to note that the CVE system does not include risk, impact, fix, or other technical information, and it does not provide vulnerability management or vulnerability assessment capabilities. Rather, it is a key component that these types of capabilities can leverage.

Mitre

Mitre.org is a well-known organization that manages numerous cybersecurity initiatives, including the CVE Program. Established in 1999, the CVE Program aims to identify, define, and catalog publicly disclosed security vulnerabilities in a standardized manner. This helps security professionals, organizations, and developers effectively address and manage vulnerabilities across their systems.

Mitre.org is responsible for the distribution and maintenance of the Common Vulnerabilities and Exposures (CVE) database. The CVE database contains a comprehensive list of vulnerabilities identified by both experts and the cybersecurity community. Mitre.org ensures that every vulnerability listed in the CVE database receives a unique identifier, which makes it easier for practitioners to reference and search specific vulnerabilities.

One of the strengths of Mitre.org’s CVE Program is its ability to integrate with other cybersecurity services and tools. This helps organizations streamline their vulnerability management processes and make informed security decisions based on accurate and up-to-date information.

For users wishing to download the CVE database, Mitre.org provides it in JSON format. To access the database, users can visit the CVE website’s download page and download the desired data file. The availability of the CVE database in JSON format enables researchers and security professionals to easily parse the information and integrate it with their analytical tools and systems.

In conclusion, Mitre.org plays a vital role in managing the CVE Program and maintaining the CVE database. Its commitment to standardizing vulnerability information and providing seamless integration capabilities makes it a valuable resource for cybersecurity professionals and organizations.

National Vulnerability Database

The National Vulnerability Database (NVD) is a U.S. government repository of standards-based vulnerability management data. This data includes security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics. Operated by the National Institute of Standards and Technology (NIST), the NVD uses the Common Vulnerabilities and Exposures (CVE) system for its vulnerability identifiers.

While the CVE system provides a baseline for identifying vulnerabilities, the NVD goes a step further by providing more detailed vulnerability information including severity scores, impact metrics, and enhanced data to support vulnerability management.

For each vulnerability listed in the database, the NVD includes the vulnerability’s description, published and modified dates, references, and the vulnerability’s severity score as measured by the Common Vulnerability Scoring System (CVSS). The NVD’s website provides users with the ability to search this database for information on specific vulnerabilities.

The NVD is a critical resource for organizations that want to protect their systems from known vulnerabilities. It allows security researchers, system administrators, and others to understand the nature of potential threats to their systems and to prioritize their actions based on the severity and potential impact of the vulnerabilities.

VulnDB

VulnDB is a vulnerability database that provides comprehensive information on known security vulnerabilities in software products. It is one of the most important sources for people responsible for handling vulnerabilities, vulnerability management, exploit analysis, cyber threat intelligence, and incident response handling.

VulnDB was originally created in 2002 by a group of security researchers who wanted to provide a central repository for information on security vulnerabilities. The database was originally called Open Source Vulnerability Database (OSVDB), and it was maintained by the Open Security Foundation (OSF). In 2016, the OSF closed down, and VulnDB was acquired by Flashpoint.

It was built with the goal of providing the most timely and accurate vulnerability intelligence available. The database includes information on each vulnerability’s technical details, mitigation strategies, exploit information, and links to original advisories, as well as a wealth of other relevant information that can be used by cybersecurity professionals to protect their systems.

It covers an extensive range of security vulnerabilities, including many not found in the CVE (Common Vulnerabilities and Exposures) database. This makes VulnDB the largest and most comprehensive vulnerability database in the industry. Its creators had a clear vision: to help organizations better understand their security risks and prioritize their response strategies accordingly.

One of the key features of VulnDB is its ability to serve an easy-to-use SaaS Portal and a RESTful API, allowing for seamless integration with GRC (Governance, Risk Management, and Compliance) tools, ticketing systems, and other third-party services. This flexibility empowers organizations to efficiently access and use the valuable vulnerability data provided by VulnDB.

VulnDB’s offerings go beyond just providing vulnerability information. The database is frequently updated and enriched with additional details, such as verified fixes, suggested solutions, and relevant chatter from social media platforms like Twitter. This valuable extra context allows security professionals to better understand the potential impact of a vulnerability and implement the most suitable remediation strategies.

Security Database

Security Database is a prominent platform that was established to provide comprehensive information on publicly disclosed security vulnerabilities. As the largest vulnerability database in Europe, it has made a significant impact on the cybersecurity landscape, offering a wealth of resources for security professionals to draw upon. With an unwavering focus on presenting accurate and relevant data, Security Database maintains a confident, knowledgeable, neutral, and clear tone.

This extensive database not only offers a vast repository of vulnerability information but also provides users with numerous additional services. One notable feature is its ability to serve as an Application Programming Interface (API), which enables the seamless integration of its data with various third-party tools and software. This capacity allows users to access up-to-date vulnerability information in real time, ensuring they remain informed and protected from potential threats.

In addition to its primary function as a vulnerability database, Security Database offers various supplementary resources, including security research papers, exploit databases, and details on upcoming security-related events. These offerings contribute to the platform’s value as a one-stop solution for cybersecurity experts, enabling them to stay current on critical industry developments.

Vuldb

VulDB is the world’s leading vulnerability database, with over 235,000 entries. It was founded in 1998 and is now owned by pyxyp inc. VulDB provides comprehensive information on security vulnerabilities, including their technical details, exploit availability, and impact. It is a valuable resource for vulnerability management, exploit analysis, cyber threat intelligence, and incident response.

The moderation team at Vuldb actively monitors numerous sources 24/7 for information about new or existing vulnerabilities. Once a new vulnerability is identified, the team gathers additional data from various sources and creates a detailed Vuldb entry, which is then made available to customers through the website and API.

One of the key features of Vuldb is its ability to seamlessly integrate with third-party services, such as GRC tools and ticketing systems. This is achieved through its RESTful API, which enables easy access to vulnerability information, allowing organizations to quickly identify and respond to potential security risks.

Which Vulnerability Database is Perfect for You?

Every service offers distinct features. The CVE project and Mitre are authorized bodies whose primary responsibility is to assign CVE IDs to identified vulnerabilities. NVD’s task is to evaluate these CVE-assigned vulnerabilities and provide Severity and CVSS scores along with vector details. Other CNA authorities like VulnDB, Security Database, and VulDB offer more precise research information such as descriptions, technical details, affected software, hardware, and services, including version information. They also provide exploitation POC details and fix/mitigation information. The choice of a vulnerability database depends on the level of information you require.

Below is a basic comparison table for these entities based on key parameters. Keep in mind that this table provides a high-level overview, and the actual specifics may vary depending on different use cases, user requirements, and other factors. Some of these databases may offer more specific features, tools, or data through a subscription or specific partnership agreement.

CVE.orgNational Vulnerability DatabaseMITRE.orgVulnDBSecurity DatabaseVulDB
Operated ByMITRE CorpNISTMITRE CorpRisk Based SecurityVariesScip AG
Information ProvidedVulnerability identifiersVulnerability details, metrics, and checklistsResearch, projects, and CVE systemDetailed vulnerability info, mitigation strategies, exploit infoGenerally provides vulnerability info (specifics can vary)Detailed vulnerability info, references, affected software versions
Free AccessYesYesYesLimited free access, subscription for more dataVariesLimited free access, subscription for more data
ScopeGlobalPrimarily U.S. focusedGlobalGlobalVariesGlobal
Update FrequencyRegularlyRegularlyRegularlyRegularlyVariesRegularly
API SupportNoYesNoYes (with subscription)VariesYes (with subscription)

Conclusion

Public vulnerability databases are invaluable resources that allow organizations to search for and analyze known security flaws impacting the myriad technologies they rely upon.

In this post, we looked at various facets of tracking vulnerabilities using CVE IDs, CVSS scoring and CNAs. We also covered the leading vulnerability data repositories like NVD, VulnDB, Vuldb, and more that security teams can leverage to power risk management programs.

Here are some key takeaways:

  • CVE IDs offer standardized naming for vulnerabilities. CVSS scores quantify severity. CNAs coordinate CVE assignments.

  • National Vulnerability Database provides extensive CVE listings with CVSS scoring.

  • MITRE CVE List contains the authoritative source of CVE data.

  • Vulnerability intelligence databases like VulnDB, VulDB, and others enhance CVE data with critical context.

  • Options like Security Database and CERT.org provide downloadable vulnerability data dumps.

  • Vendor databases and Git repositories also offer valuable vulnerability data.

With cyber threats increasing, organizations must proactively monitor disclosure channels to detect new vulnerabilities in their environment and prioritize remediation. Public vulnerability databases combined with internal threat intelligence provide the comprehensive visibility needed to continuously improve organizational risk posture.

Thanks for reading this post. Please share this post and help secure the digital world. Visit our website, thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive updates like this.  

List of 307 CVE Numbering Authority (CNA)

PartnerScopeProgram RoleOrganization TypeCountry*
42Gears Mobility Systems Pvt Ltd42Gears branded products and technologies onlyCNAVendorIndia
Absolute SoftwareAbsolute issues onlyCNAVendorUSA
Acronis International GmbHAll Acronis products, including Acronis Cyber Protect, Acronis Cyber Protect Home Office, Acronis DeviceLock DLP, and Acronis Snap DeployCNAVendorSwitzerland
Adobe Systems IncorporatedAdobe issues onlyCNAVendorUSA
Advanced Micro Devices Inc.AMD branded products and technologies onlyCNAVendorUSA
AirbusAll Airbus products (supported products and end-of-life/end-of-service products), as well as vulnerabilities in third-party software discovered by Airbus that are not in another CNA’s scopeCNAVendor, ResearcherNetherlands
Alias Robotics S.L.All Alias Robotics products, as well as vulnerabilities in third-party robots and robot components (software and hardware), as well as machine tool and machine tool components, discovered by Alias Robotics that are not in another CNA’s scopeCNAVendor, ResearcherSpain
Alibaba, Inc.Projects listed on its Alibaba GitHub website onlyCNAVendor, Open SourceChina
AMIVulnerabilities that affect AMI firmware and software productsCNAOpen Source, VendorUSA
Ampere ComputingAmpere issues onlyCNAVendorUSA
Android (associated with Google Inc. or Open Handset Alliance)Android issues, as well as vulnerabilities in third-party software discovered by Android that are not in another CNA’s scopeCNAVendor, Open Source, ResearcherUSA
Apache Software FoundationAll Apache Software Foundation issues onlyCNAVendor, Open SourceUSA
AppCheck Ltd.Vulnerabilities discovered by AppCheck that are not within another CNA’s scopeCNAResearcherUK
Apple Inc.Apple issues onlyCNAVendorUSA
Arista Networks, Inc.All Arista products onlyCNAVendorUSA
Arm LimitedArm-branded products and technologies and Arm-managed open source projectsCNAOpen Source, VendorUK
Artica PFMSPandora FMS, Integria IMS, and eHorus issues onlyCNAVendorSpain
Asea Brown Boveri Ltd. (ABB)ABB issues onlyCNAVendorSwitzerland
ASUSTOR, Inc.ASUSTOR issues onlyCNAVendorTaiwan
AtlassianAll Atlassian products, as well as Atlassian-maintained projects hosted on https://bitbucket.org/ and https://github.com/atlassian/CNAVendor, Open SourceAustralia
Austin Hackers AnonymousVulnerabilities in the AHA! website and other AHA! controlled assets, as well as vulnerabilities identified in assets owned, operated, or maintained by another organization unless covered by the scope of another CNACNAResearcherUSA
AutodeskAll currently supported Autodesk Applications and Cloud ServicesCNAVendorUSA
Automotive Security Research Group (ASRG)All automotive and related infrastructure vulnerabilities that are not in another CNA’s scopeCNAResearcherUSA
Avaya, Inc.All Avaya Generally Available (GA) products that are not in another CNA’s scope. A CVE ID will not be issued for End of Manufacturing Support (EoMS) products/versionsCNAVendorUSA
Axis Communications ABSupported Axis products and solutions onlyCNAVendorSweden
B. Braun SEB. Braun’s commercially available products onlyCNAVendorGermany
Baicells Technologies Co., Ltd.All Baicells productsCNAVendorChina
Baidu, Inc.Projects listed on Baidu’s PaddlePaddle GitHub website onlyCNAVendor, Open SourceChina
Baxter HealthcareBaxter’s commercially available products onlyCNAVendorUSA
Becton, Dickinson and Company (BD)BD software-enabled medical devices onlyCNAVendorUSA
Biohacking VillageVulnerabilities discovered by researchers in collaboration with Biohacking Village, with approval of Biohacking Village’s sponsors, that are not in another CNA’s scopeCNAResearcherUSA
BitdefenderAll Bitdefender products, as well as vulnerabilities in third-party software discovered by Bitdefender that are not in another CNA’s scopeCNAVendor, ResearcherRomania
Black Lantern SecurityVulnerabilities in vendor products discovered by BLSOPS, or related parties, while performing vulnerability research or security assessments, unless covered by another CNA’s scopeCNAResearcherUSA
BlackBerryBlackBerry and Good product issues onlyCNAVendorCanada
Brocade Communications Systems, LLCBrocade products onlyCNAVendorUSA
Bugcrowd Inc.Vulnerabilities discovered by researchers in collaboration with Bugcrowd, with approval of Bugcrowd’s clients, and not in the scope of another CNACNABug Bounty Provider, Vendor, Open SourceUSA
CA Technologies – A Broadcom CompanyCA Technologies issues onlyCNAVendorUSA
Canon Inc.Vulnerabilities in products and services designed and developed by Canon Inc.CNAVendorJapan
Canonical Ltd.All Canonical issues (including Ubuntu Linux) onlyCNAVendor, Open SourceUK
Carrier Global CorporationCarrier Global products onlyCNAHosted Service, VendorUSA
CensysAll Censys products, and vulnerabilities discovered by Censys that are not in another CNA’s scopeCNAVendor, ResearcherUSA
CERT/CCVulnerability assignment related to its vulnerability coordination roleCNACERTUSA
CERT@VDEProducts of the vendors: Beckhoff, Bender, Endress+Hauser, Etherwan Systems, HIMA, Festo, Koramis, ifm, Miele, Pepperl+Fuchs, Phoenix Contact, PILZ, Sysmik, Weidmueller, and WAGO. Also, industrial and infrastructure control systems (and its components) of European Union (EU) based vendors as long as there is no CNA with a more specific scope for the vulnerabilityCNACERTGermany
Check Point Software Ltd.Check Point Security Gateways product line only, and any vulnerabilities discovered by Check Point that are not in another CNA’s scopeCNAVendor, ResearcherIsrael
ChromeChrome and Chrome OS issues, and projects that are not in another CNA’s scopeCNAVendor, Open Source, ResearcherUSA
Cisco Systems, Inc.All Cisco products, and any third-party research targets that are not in another CNA’s scope. Cisco will not issue a CVE ID for issues reported on products that are past the Last Day of Support milestone, as defined on Cisco’s End-of-Life Policy, which is available at https://www.cisco.com/c/en/us/products/eos-eol-policy.htmlCNAHosted Service, Open Source, Researcher, VendorUSA
Citrix Systems, Inc.Citrix issues onlyCNAVendorUSA
Cloudflare, Inc.All Cloudflare products, projects hosted at https://github.com/cloudflare/, and any vulnerabilities discovered by Cloudflare that are not in another CNA’s scopeCNAVendorUSA
Crafter CMSCrafter CMS issues onlyCNAVendor, Open SourceUSA
Crestron Electronics, Inc.Crestron productsCNAVendorUSA
Crowdstrike Holdings, Inc.Crowdstrike Sensor issues, excluding unsupported versions, and issues in third-party products or services identified by Crowdstrike research unless covered in the scope of another CNACNAVendorUSA
Cybellum Technologies LTDAll Cybellum products, as well as vulnerabilities in third-party software discovered by Cybellum that are not in another CNA’s scopeCNAVendorIsrael
Cyber Security Works Pvt. Ltd.Vulnerabilities in third-party software discovered by CSW that are not in another CNA’s scopeCNAResearcherIndia
CyberArk LabsVulnerabilities discovered by CyberArk Labs that are not in another CNA’s scopeCNAVendor, ResearcherIsrael
CyberDanubeAll CyberDanube products, as well as vulnerabilities in third-party hardware/software discovered by CyberDanube or partners actively engaged in vulnerability research coordination, which are not within the scope of another CNACNAResearcher, VendorAustria
Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)Industrial control systems and medical devicesTop-Level Root, CNA-LRCERTUSA
Dahua TechnologiesDahua consumer Internet of Things (IoT) products, excludes End-of-Life productsCNAVendorChina
Dassault SystèmesAll websites of the corporate group and of any subsidiaries, including but not limited to www.3ds.com and www.solidworks.com; all Software as a Service solutions, such as 3DEXPERIENCE or ScienceCloud, but also any online hosting linked to our brands; and all Dassault Systèmes licensed software productsCNAVendorFrance
Debian GNU/LinuxDebian issues onlyCNAVendor, Open SourceUSA
DeepSurface Security, Inc.All DeepSurface products, as well as vulnerabilities in third-party software discovered by DeepSurface that are not in another CNA’s scopeCNAVendor, ResearcherUSA
DellDell, Dell EMC, and VCE issues onlyCNAVendorUSA
Devolutions Inc.Remote Desktop Manager and Devolutions Server productsCNAVendor, Open SourceCanada
Docker Inc.All Docker products, including Docker Desktop and Docker Hub, as well as Docker maintained open-source projectsCNAVendor, Open SourceUSA
Document Foundation, TheProjects within The Document Foundation only, e.g., LibreOffice, LibreOffice Online; The Document Foundation discourages reporting denial of service bugs as security issuesCNAVendor, Open SourceGermany
dotCMS LLCAll dotCMS product services including the vulnerabilities reported in our open-source core located at https://github.com/dotCMS/coreCNAHosted ServiceUSA
Dragos, Inc.Dragos products and third-party products it researches related to operational technology (OT)/industrial control systems (ICS) not covered by another CNACNAVendor, ResearcherUSA
Drupal.orgAll projects hosted under drupal.org onlyCNAVendor, Open SourceUSA
Dual Vipers LLCDual Vipers projects and products (both open and closed source), as well as vulnerabilities in third-party software discovered by Dual Vipers that are not in another CNA’s scopeCNAHosted Service, Open Source, Researcher, VendorUSA
Dutch Institute for Vulnerability Disclosure (DIVD)Vulnerabilities in software discovered by DIVD, and vulnerabilities reported to DIVD for coordinated disclosure, which are not in another CNA’s scopeCNAResearcherNetherlands
EatonEaton issues onlyCNAVendorIreland
Eclipse FoundationEclipse IDE and the Eclipse Foundation’s eclipse.org, polarysys.org, and locationtech.org open source projects onlyCNAVendor, Open SourceCanada
ElasticElasticsearch, Kibana, Beats, Logstash, X-Pack, and Elastic Cloud Enterprise products onlyCNAVendorNetherlands
Electronic Arts, Inc.EA issues onlyCNAVendorUSA
Environmental Systems Research Institute, Inc.All Esri products onlyCNAVendorUSA
ESET, spol. s r.o.All ESET products only and vulnerabilities discovered by ESET that are not covered by another CNA’s scopeCNAVendor, ResearcherSlovak Republic
Exodus IntelligenceVulnerabilities discovered by Exodus Intelligence as well as acquisitions from independent researchers via its Research Sponsorship Program (RSP)CNABug Bounty Provider, ResearcherUSA
F-SecureAll F-Secure products and security vulnerabilities discovered by F-Secure in third-party software not in another CNA’s scopeCNAVendor, ResearcherFinland
F5, Inc.All F5 products and services, commercial and open source, which have not yet reached End of Technical Support (EoTS). All legacy acquisition products and brands including, but not limited to, NGINX, Shape Security, Volterra, and Threat Stack. F5 does not issue CVEs for products which are no longer supportedCNAVendor, Open SourceUSA
Fedora ProjectVulnerabilities in open-source projects affecting the Fedora Project, that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported releases by the Fedora ProjectCNAVendor, Open SourceUSA
Fidelis Cybersecurity, Inc.Fidelis issues onlyCNAVendorUSA
Flexera Software LLCAll Flexera products, and vulnerabilities discovered by Secunia Research that are not in another CNA’s scopeCNAVendor, Open Source, ResearcherUSA
floragunn GmbHAll issues related to Search Guard onlyCNAVendor, Open SourceGermany
Fluid AttacksVulnerabilities in third-party software discovered by Fluid Attacks that are not in another CNA’s scopeCNAResearcherColombia
ForcepointForcepoint products onlyCNAVendorUSA
ForgeRock, Inc.ForgeRock issues onlyCNAVendor, Open SourceUSA
Fortinet, Inc.Fortinet issues onlyCNAVendorUSA
FPT Software Co., Ltd.All products and services developed and operated by FPT Software, as well as vulnerabilities in third-party software discovered by FPT Software that are not in another CNA’s scopeCNAVendor, ResearcherVietnam
Frappe Technologies Pvt. Ltd.Vulnerabilities relating to Frappe Framework, ERPNext product, erpnext.com, and frappecloud.com hosting services, as well as other vulnerabilities discovered by Frappe Technologies that are not under the scope of any other CNACNABug Bounty ProviderIndia
FreeBSDPrimarily FreeBSD issues onlyCNAVendor, Open SourceUSA
FULL INTERNETAll FULL products, as well as vulnerabilities in third-party software discovered by FULL that are not in another CNA’s scopeCNABug Bounty Provider, Hosted Service, Vendor, ResearcherBrazil
Gallagher Group Ltd.All Gallagher security products onlyCNAVendorNew Zealand
GE HealthcareGE Healthcare productsCNAVendorUSA
General Electric (Gas Power)GE (Gas Power) issues onlyCNAVendorUSA
Genetec Inc.Genetec products and solutions onlyCNAHosted Service, VendorCanada
Gitea LimitedGitea issues onlyCNAOpen Source, VendorChina
GitHub, Inc.GitHub currently only covers CVEs requested by software maintainers using the GitHub Security Advisories featureCNAVendorUSA
GitHub, Inc. (Products Only)GitHub Enterprise Server issues onlyCNAVendorUSA
GitLab Inc.The GitLab application, any project hosted on GitLab.com in a public repository, and any vulnerabilities discovered by GitLab that are not in another CNA’s scopeCNAVendor, ResearcherUSA
Glyph & Cog, LLCXpdf open source project, including the xpdf viewer and associated command line toolsCNAOpen Source, VendorUSA
Go ProjectVulnerabilities in software published by the Go Project (including the Go standard library, Go toolchain, and the golang.org modules) and publicly disclosed vulnerabilities in publicly importable packages in the Go ecosystem, unless covered by another CNA’s scopeCNAVendor, Open SourceUSA
Google DevicesGoogle Devices – Pixel, Nest, and ChromecastCNAVendorUSA
Google LLCRoot Scope: Alphabet organizationsCNA Scope: Google products that are not covered by Android and Chrome, as well as vulnerabilities in third-party software discovered by Google that are not in another CNA’s scopeRoot, CNAVendor, Open Source, ResearcherUSA
Google Open Source SoftwareVulnerabilities in open source software published and maintained by GoogleCNAVendor, Open SourceUSA
Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)Vulnerabilities discovered by GovTech CSG only that are not in another CNA’s scopeCNAResearcherSingapore
Grafana LabsAll Grafana Labs open source and commercial productsCNAVendor, Open SourceUSA
Green Rocket Security Inc.Green Rocket Security products including EOL unless covered by another CNA’s scopeCNAVendorUSA
GS McNamara LLCGS McNamara LLC products and services, including the Floodspark portfolio, and any vulnerabilities discovered in components or projects that we are researching or coordinating that are not in another CNA’s scopeCNAVendor, ResearcherUSA
HackerOneProvides CVE IDs for its customers as part of its bug bounty and vulnerability coordination platformCNABug Bounty ProviderUSA
HalbornAll blockchain and Web3 products that rely on smart contracts written in Rust, Go, and Solidity, as well as blockchain associated Web2 and Web3 infrastructure not covered by another CNACNAResearcherUSA
Hallo Welt! GmbHBlueSpice vulnerabilities onlyCNAVendorGermany
Hangzhou Hikvision Digital Technology Co., Ltd.All Hikvision Internet of Things (IoT) products including cameras and digital video recorders (DVRs)CNAVendorChina
Hanwha Vision Co., Ltd.Hanwha Vision (formerly Samsung Techwin and Hanwha Techwin) products and solutions only, including end-of-life (EOL)CNAVendorSouth Korea
HashiCorp Inc.All HashiCorp products and projects unless covered by another CNA’s scopeCNAVendorUSA
HCL SoftwareAll HCL products onlyCNAVendorIndia
Hewlett Packard Enterprise (HPE)HPE issues onlyCNAVendorUSA
Hillstone Networks Inc.Vulnerabilities in our products listed at https://www.hillstonenet.com/hillstone-networks-product-portfolio and the products we sell only in China listed at https://www.hillstonenet.com.cn/product_service/, not including our websitesCNAVendorChina
Hitachi EnergyHitachi Energy products onlyCNAVendorSwitzerland
Hitachi VantaraAll Hitachi Vantara products and technologiesCNAVendorUSA
Hitachi, Ltd.Hitachi products excluding Hitachi Energy and Hitachi Vantara productsCNAVendorJapan
Honeywell International Inc.All Honeywell productsCNAVendorUSA
Honor Device Co., Ltd.Vulnerabilities in Honor products and services unless covered by the scope of another CNACNAVendorChina
HP Inc.HP Inc. issues onlyCNAVendorUSA
Huawei TechnologiesHuawei issues onlyCNAVendorChina
huntr.devVulnerabilities in third-party code reported to huntr.dev that are not in another CNA’s scopeCNABug Bounty ProviderUK
HYPR CorpAll HYPR products onlyCNAVendorUSA
IBM CorporationAll IBM products, as well as vulnerabilities in third-party software discovered by IBM X-Force Red that are not in another CNA’s scopeCNAVendor, Open Source, ResearcherUSA
ID Business SolutionsIDBS products as listed on https://www.idbs.com/products/CNAVendorUK
IDEMIAAll IDEMIA products (supported products and end-of-life/end-of-service products), as well as vulnerabilities in third-party software discovered by IDEMIA that are not in another CNA’s scopeCNAResearcher, VendorFrance
IllumioIllumio issues onlyCNAVendorUSA
Indian Computer Emergency Response Team (CERT-In)Vulnerability coordination for vulnerabilities in all products reported to CERT-In in accordance with our vulnerability coordination role as a CERT. Vulnerability assignments for vulnerabilities impacting all products designed, developed, and manufactured in IndiaCNACERTIndia
Intel CorporationIntel branded products and technologies and Intel managed open source projectsCNAVendor, Open SourceUSA
Internet Systems Consortium (ISC)All ISC.org projectsCNAVendor, Open SourceUSA
IoT83 LtdVulnerabilities in IoT83 product(s), services, and components only. Third-party, open-source components used in IoT83 product(s), services, and components are not in scopeCNAVendorUSA
Israel National Cyber Directorate (INCD)Vulnerability assignment related to its vulnerability coordination roleCNACERTIsrael
Jenkins ProjectJenkins and Jenkins plugins distributed by the Jenkins Project (listed on plugins.jenkins.io) onlyCNAOpen SourceUSA
JetBrains s.r.o.JetBrains products onlyCNAVendor, Open SourceCzech Republic
JFrogAll JFrog products (supported products and end-of-life/end-of-service products); vulnerabilities in third-party software discovered by JFrog that are not in another CNA’s scope; and vulnerabilities in third-party software discovered by external researchers and disclosed to JFrog (includes any embedded devices and their associated mobile applications) that are not in another CNA’s scopeCNAVendor, ResearcherIsrael
Johnson ControlsJohnson Controls products onlyCNAVendorUSA
Joomla! ProjectCore Joomla! CMS, the Joomla Framework, and Joomla! Extensions issues onlyCNAVendor, Open SourceUSA
JPCERT/CCRoot Scope: Japan organizationsCNA Scope: Vulnerability assignment related to its vulnerability coordination roleRoot, CNACERTJapan
Juniper Networks, Inc.Juniper issues onlyCNAVendor, Open SourceUSA
KasperskyKaspersky B2C and B2B products, as well as vulnerabilities discovered in third-party software not in another CNA’s scopeCNAVendor, ResearcherRussia
KNIME AGAll vulnerabilities on software products that our company provides, including KNIME Analytics Platform, KNIME Server, and KNIME HubCNAVendorSwitzerland
KrakenD, S.L.KrakenD EE, KrakenD CE, and Lura issues onlyCNAVendor, Open SourceSpain
KrCERT/CCVulnerability assignment related to its vulnerability coordination roleCNACERTSouth Korea
KubernetesKubernetes issues onlyCNAVendor, Open SourceUSA
Larry CashdollarThird-party products he researches that are not in another CNA’s scopeCNAResearcherUSA
Lenovo Group Ltd.Lenovo general-purpose computers, software for general-purpose operating systems, mobile devices, enterprise storage, and networking products onlyCNAVendorUSA
LG ElectronicsLG Electronics products onlyCNAVendorSouth Korea
Liferay, Inc.All Liferay supported products and end-of-life/end-of-service productsCNAVendorUSA
LINE CorporationCurrent versions of LINE Messenger Application for iOS, Android, Mac, and Windows, plus LINE Open Source projects hosted on https://github.com/lineCNAVendor, Open SourceJapan
LogitechAll current products/software/apps made by Logitech, Ultimate Ears, Jaybird, Streamlabs, Logitech G, Logicool, Blue, and Astro GamingCNAVendorSwitzerland
M-Files CorporationM-Files and Hubshare productsCNAVendorFinland
MarkLogic CorporationMarkLogic issues onlyCNAVendorUSA
Mattermost, Inc.All Mattermost issues, and vulnerabilities discovered by Mattermost that are not in another CNA’s scopeCNAVendor, ResearcherUSA
MauticMautic core and officially supported pluginsCNAVendor, Open SourceUSA
MediaTek, Inc.MediaTek product issues onlyCNAVendorTaiwan
MedtronicAll products of Medtronic or a Medtronic company including supported products and end-of-life/end-of-service products, as well as vulnerabilities in third-party software discovered in Medtronic products that are not in another CNA’s scopeCNAVendorUSA
MendVulnerabilities in Mend (formerly WhiteSource) products and vulnerabilities in third-party software discovered by Mend that are not in another CNA’s scopeCNAVendor, ResearcherUSA
Meta Platforms, Inc.Meta-supported open source projects, mobile apps, and other software, as well as vulnerabilities in third-party software discovered by Meta that are not in another CNA’s scope; see: https://www.facebook.com/whitehat and https://github.com/facebook/CNAVendor, Open Source, ResearcherUSA
Microsoft CorporationMicrosoft issues onlyCNAVendorUSA
MIM Software Inc.MIM software products, platforms, and services as well as vulnerabilities reported to MIM Software in third-party components or libraries used by MIM Software products, platforms, and services not covered by another CNACNAVendorUSA
MirantisAll Mirantis products (supported products and end-of-life/end-of-service products) and open source offerings, as well as vulnerabilities in third-party software discovered by Mirantis that are not in another CNA’s scopeCNAVendor, Open Source, ResearcherUSA
MITRE CorporationAll vulnerabilities, and Open Source software product vulnerabilities, not already covered by a CNA listed on this websiteTop-Level Root, CNA-LR, SecretariatN/AUSA
Mitsubishi Electric CorporationMitsubishi Electric issues onlyCNAVendorJapan
MongoDB, Inc.MongoDB products only, not including end-of-life components or productsCNAVendor, Open SourceUSA
Moxa Inc.Moxa products onlyCNAVendorTaiwan
Mozilla CorporationMozilla issues onlyCNAVendor, Open SourceUSA
National Cyber Security Centre Finland (NCSC-FI)Vulnerabilities in software discovered by NCSC-FI, and vulnerabilities reported to NCSC-FI for coordinated disclosure, which are not in another CNA’s scopeCNACERTFinland
National Cyber Security Centre Netherlands (NCSC-NL)Vulnerabilities in software discovered by NCSC-NL, and vulnerabilities reported to NCSC-NL for coordinated disclosure, which are not in another CNA’s scopeCNACERTNetherlands
National Cyber Security Centre SK-CERTVulnerabilities in software discovered by National Cyber Security Centre SK-CERT, and vulnerabilities reported to National Cyber Security Centre SK-CERT for coordinated disclosure, which are not in another CNA’s scopeCNACERTSlovak Republic
National InstrumentsNI products only (including National Instruments)CNAVendorUSA
Naver CorporationNaver products only, except Line productsCNAVendorSouth Korea
NEC CorporationNEC issues onlyCNAVendorJapan
NetApp, Inc.All NetApp products as well as projects hosted on https://github.com/netappCNAVendorUSA
Netflix, Inc.Current versions of Netflix Mobile Streaming Application for iOS, Android, and Windows Mobile, plus all Netflix Open Source projects hosted on https://github.com/Netflix/ and https://github.com/spinnaker/CNAVendor, Open SourceUSA
NetRiseVulnerabilities in third-party Extended Internet of Things (XIoT) devices and firmware NetRise researches that are not covered by another CNACNAResearcherUSA
NetskopeAll Netskope products and servicesCNAVendorUSA
NLnet LabsAll NLnet Labs projectsCNAVendor, Open SourceNetherlands
Node.jsAll actively developed versions of software developed under the Node.js project on https://github.com/nodejs/CNAVendor, Open SourceUSA
NortonLifeLock Inc.All NortonLifeLock product issues onlyCNAVendorUSA
Nozomi Networks Inc.All Nozomi Networks products, as well as vulnerabilities in third-party software discovered by Nozomi Networks that are not in another CNA’s scopeCNAVendor, ResearcherUSA
NVIDIA CorporationNVIDIA issues onlyCNAVendorUSA
Objective Development Software GmbHObjective Development issues onlyCNAVendorAustria
Octopus DeployAll Octopus Deploy products, as well as Octopus Deploy maintained projects hosted on https://github.com/OctopusDeployCNAVendor, Open SourceAustralia
OdooOdoo issues onlyCNAVendorBelgium
OktaOkta issues onlyCNAVendorUSA
ONEKEY GmbHAll ONEKEY products and vulnerabilities in third-party software discovered by ONEKEY that are not in another CNA’s scopeCNAVendor, ResearcherGermany
Open Design AllianceOpen Design Alliance products onlyCNAVendorUSA
Open-XchangeProducts and services provided by Open-Xchange, PowerDNS, and DovecotCNAOpen Source, VendorGermany
OpenAnolisOpenAnolis issues onlyCNAVendor, Open SourceChina
OpenCloudOS CommunityOpenCloud OS issues only, not including EOL products, unless covered by another CNA’s scopeCNAOpen SourceChina
openEuleropenEuler issues onlyCNAVendor, Open SourceChina
openGauss CommunityopenGauss issues onlyCNAOpen SourceChina
OpenHarmonyopenHarmony issues onlyCNAOpen SourceChina
OpenSSL Software FoundationOpenSSL software projects onlyCNAVendor, Open SourceUSA
OpenText (formerly Micro Focus)All OpenText products (including Carbonite, Zix, Micro Focus, others)CNAVendorUSA
OpenVPN Inc.All products and projects in which OpenVPN is directly involved commercially and for OpenVPN community projects, including Private TunnelCNAVendor, Open SourceUSA
OperaOpera issues onlyCNAVendor, Open SourceNorway
OPPO Mobile Telecommunication Corp., Ltd.OPPO devices onlyCNAVendorChina
OracleOracle supported version product issues only; CVE IDs will not be assigned for unsupported products or versions (Oracle will confirm support status and notify researcher)CNAHosted Service, Open Source, VendorUSA
OTRS AGVulnerabilities for OTRS and ((OTRS)) Community Edition and modules onlyCNAVendorGermany
Palantir TechnologiesPalantir products and technologies onlyCNAVendorUSA
Palo Alto Networks, Inc.All Palo Alto Networks products, and vulnerabilities discovered by Palo Alto Networks that are not in another CNA’s scopeCNAVendor, ResearcherUSA
Panasonic Holdings CorporationAll products and services developed and/or sold by Panasonic Group companiesCNAVendorJapan
PatchstackVulnerabilities in third-party PHP products discovered by Patchstack and Patchstack Red TeamCNABug Bounty Provider, Hosted Service, Open Source, Researcher, VendorEstonia
PayaraAll Payara Platform product distributions (Payara Server, Micro, Embedded) for both Enterprise (commercial) and Community (OSS) distributionsCNAOpen Source, VendorUK
Pegasystems Inc.Pegasystems products onlyCNAVendorUSA
PhilipsPhilips issues onlyCNAVendorNetherlands
PHP GroupVulnerabilities in PHP code (code in https://github.com/php/php-src) onlyCNAVendor, Open SourceUSA
Ping Identity CorporationAll Ping Identity products (supported products and end-of-life/end-of-service products), as well as vulnerabilities in third-party software discovered by Ping Identity that are not in another CNA’s scopeCNAHosted Service, Researcher, Bug Bounty ProviderUSA
Profelis IT ConsultancyProducts and services developed by Profelis IT Consultancy including enterprise directory solution SambaBox and password reset product PassBoxCNAVendorTürkiye
Proofpoint Inc.All Proofpoint productsCNAHosted Service, VendorUSA
PuppetAll Puppet products, as well as all projects on https://github.com/puppetlabs/CNAVendor, Open SourceUSA
QNAP Systems, Inc.QNAP issues onlyCNAVendorTaiwan
Qualcomm, Inc.Qualcomm and Snapdragon issues onlyCNAVendorUSA
Qualys, Inc.All Qualys products and vulnerabilities discovered by Qualys that are not covered by another CNA’s scopeCNAVendor, ResearcherUSA
Rapid7, Inc.All Rapid7 products, and vulnerabilities discovered by Rapid7 that are not in another CNA’s scopeCNAVendor, Open Source, ResearcherUSA
Red Hat, Inc.Root Scope: The Red Hat Root’s scope includes the open-source community. Any open-source organizations that prefer Red Hat as their Root; organizations are free to choose another Root if it suits them betterCNA Scope: Vulnerabilities in open-source projects affecting Red Hat offerings, that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported Red Hat offeringsRoot, CNAVendor, Open SourceUSA
Replicated, Inc.Replicated products and services onlyCNAVendorUSA
Rhino MobilityRhino Mobility issues onlyCNAVendorUSA
Ribose LimitedAll Ribose products and services, including open-source projects, supported products, and end-of-life/end-of-service productsCNAHosted Service, Open Source, VendorUK
Robert Bosch GmbHBosch products onlyCNAVendorGermany
Rockwell AutomationAll Rockwell Automation productsCNAVendorUSA
SailPoint TechnologiesSailPoint issues onlyCNAVendorUSA
Salesforce, Inc.Salesforce products onlyCNAVendorUSA
Samsung MobileSamsung Mobile Galaxy products, personal computers, and related services onlyCNAVendorSouth Korea
Samsung TV & ApplianceSamsung TV & Appliance products, Samsung-owned open-source projects listed on https://github.com/Samsung/, as well as vulnerabilities in third-party software discovered by Samsung that are not in another CNA’s scope. Vulnerabilities affecting end-of-life/end-of-service products are in scope. The following categories of Samsung Products are in scope: Internet-connected home appliances, B2C product (smart TV, smart monitor, soundbar, and projector), and B2B products (digital signage, interactive display, and kiosk)CNAOpen Source, Researcher, VendorSouth Korea
SAP SEAll SAP productsCNAVendorGermany
Schneider ElectricAll Schneider Electric products, including Proface, APC, and EurothermCNAVendorFrance
Schweitzer Engineering Laboratories, Inc.All Schweitzer Engineering Laboratories productsCNAVendorUSA
Seagate TechnologyAny Seagate or LaCie software or hardware, open or closed source, supported and end of life, as well as any vulnerabilities in third-party software discovered by Seagate that are not in another CNA’s scopeCNAVendor, Open Source, ResearcherUSA
Secomea A/SSupported Secomea products onlyCNAVendorDenmark
Securifera, Inc.Vulnerabilities in vendor products discovered by Securifera, or related parties, while performing vulnerability research or security assessmentsCNAResearcherUSA
Security Risk Advisors (SRA)Vulnerabilities discovered by SRA that are not within the scope of another CNACNAResearcherUSA
senhaseguraVulnerabilities in senhasegura products, and other vulnerabilities discovered by senhasegura that are not in another CNA’s scopeCNAVendor, ResearcherBrazil
ServiceNowAll ServiceNow products (supported products and end-of-life/end-of-service products), as well as vulnerabilities in third-party software discovered by ServiceNow that are not in another CNA’s scopeCNAHosted Service, Researcher, VendorUSA
Shop Beat Solutions (Pty) LTDVulnerabilities in Shop Beat products and services and vulnerabilities discovered by Shop Beat unless covered by the scope of another CNACNAHosted Service, VendorSouth Africa
SICK AGSICK AG issues onlyCNAVendorGermany
SiemensSiemens issues onlyCNAVendorGermany
Sierra Wireless Inc.Sierra Wireless products onlyCNAVendorCanada
Silicon LabsSilicon Labs issues onlyCNAVendorUSA
Silver Peak Systems, Inc.Silver Peak product issues onlyCNAVendorUSA
Simplinx Ltd.Simplinx products onlyCNAVendorTürkiye
Snow SoftwareAll Snow Software productsCNAVendorSweden
SnykVulnerabilities in Snyk products and vulnerabilities discovered by, or reported to, Snyk that are not in another CNA’s scopeCNAOpen Source, ResearcherUK
SolarWindsSolarWinds products onlyCNAVendorUSA
SolidigmSolidigm branded products and technologiesCNAVendorUSA
SonicWall, Inc.SonicWall issues onlyCNAVendorUSA
Sophos LimitedSophos issues onlyCNAVendorUK
Spanish National Cybersecurity Institute, S.A. (INCIBE)Root Scope: Spain organizationsCNA Scope: Vulnerability assignment related to its vulnerability coordination role for Industrial Control Systems (ICS), Information Technologies (IT), and Internet of Things (IoT) systems issues at the national level, and vulnerabilities reported to INCIBE by Spain organizations and researchers that are not in another CNA’s scopeRoot, CNACERTSpain
Splunk Inc.Splunk products onlyCNAVendorUSA
STAR Labs SG Pte. Ltd.Vulnerabilities discovered by STAR Labs SG that are not in another CNA’s scopeCNAResearcherSingapore
StrongDMStrongDM issues onlyCNAVendorUSA
SUSESUSE and Rancher issues onlyCNAVendor, Open SourceUSA
Swift ProjectThe Swift Project onlyCNAVendor, Open SourceUSA
Switzerland National Cyber Security Centre (NCSC)Switzerland Government Common Vulnerability ProgramCNACERTSwitzerland
Symantec – A Division of BroadcomSymantec Enterprise products as well as vulnerabilities in third-party software discovered by Symantec that are not in another CNA’s scopeCNAVendor, ResearcherUSA
Synaptics, Inc.Synaptics issues onlyCNAVendorUSA
Synology Inc.Synology issues onlyCNAVendorTaiwan
SynopsysAll Synopsys SIG products, as well as vulnerabilities in third-party software discovered by Synopsys SIG that are not in another CNA’s scopeCNAVendor, ResearcherUSA
TalosThird-party products it researchesCNAResearcherUSA
Tcpdump GroupTcpdump and Libpcap onlyCNAVendor, Open SourceCanada
TeamViewer Germany GmbHTeamViewer issues onlyCNAVendorGermany
Temporal Technologies Inc.All Temporal Technologies softwareCNAHosted Service, Open SourceUSA
Tenable Network Security, Inc.Tenable products and third-party products it researches not covered by another CNACNAVendorUSA
Thales GroupThales branded products and technologies onlyCNAVendor, ResearcherFrance
The HISP Centre at the University of OsloSecurity issues in DHIS2 open-source web and mobile software applicationsCNAVendor, Open SourceNorway
The Missing Link Australia (TML)TML vulnerability disclosure policy applies to any third-party vendor products to whom TML will assign the CVEs for vulnerabilities, if the product is not a part of another CNA scopeCNAResearcherAustralia
The OpenBMC ProjectVulnerabilities related to the repositories maintained by the OpenBMC projectCNAVendor, Open SourceUSA
The OpenNMS GroupOpenNMS issues onlyCNAVendor, Open SourceUSA
TianoCore.orgSoftware vulnerabilities related to the TianoCore Open SourceCNAVendor, Open SourceUSA
TIBCO Software Inc.TIBCO, Talarian, Spotfire, Data Synapse, Foresight, Kabira, Proginet, LogLogic, StreamBase, JasperSoft, and Mashery products/brands onlyCNAVendorUSA
Tigera, Inc.All vulnerabilities for Calico and all of Tigera’s products onlyCNAVendor, Open SourceUSA
Toshiba CorporationVulnerabilities related to products and services of Toshiba CorporationCNAVendorJapan
TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)Vulnerability assignment related to its vulnerability coordination roleCNACERTTürkiye
TrellixAll Trellix Enterprise (formerly McAfee Enterprise and FireEye) products, as well as vulnerabilities in third-party software discovered by Trellix Advanced Research Center (Trellix ACR) that are not in another CNA’s scopeCNAVendor, ResearcherUSA
Trend Micro, Inc.Trend Micro supported products, end-of-life products, and all issues related to TXOne productsCNAVendorJapan
Tribe29 GmbHAll products of Tribe29 including Checkmk and Checkmk ApplianceCNAVendor, Open SourceGermany
TWCERT/CCVulnerability assignment related to its vulnerability coordination roleCNACERTTaiwan
Unisoc (Shanghai) Technologies Co., Ltd.Unisoc issues onlyCNAVendorChina
Vaadin Ltd.All Vaadin products and supported open-source projects hosted at https://github.com/vaadinCNAVendor, Open SourceFinland
Vivo Mobile Communication Co., Ltd.Vivo issues onlyCNAVendorChina
VMwareVMware, Spring, and Cloud Foundry issues onlyCNAVendor, Open SourceUSA
VulDBVulnerabilities discovered by, or reported to, the VulDB vulnerability database that are not in another CNA’s scopeCNAResearcherSwitzerland
VulnCheckVulnerabilities discovered by, or reported to, VulnCheck that are not in another CNA’s scopeCNABug Bounty Provider, ResearcherUSA
Vulnscope TechnologiesProvides CVE IDs for customers as part of our bug bounty and vulnerability coordination platformCNABug Bounty ProviderChile
WatchGuard Technologies, Inc.Vulnerabilities in all WatchGuard products and products of WatchGuard subsidiariesCNAVendorUSA
Western DigitalWestern Digital products including WD, SanDisk, SanDisk Professional, G-Technology, and HGST onlyCNAVendorUSA
wolfSSL Inc.Transport Layer Security (TLS) and Cryptographic issues found in wolfSSL productsCNAVendor, Open SourceUSA
WordfenceWordPress Plugins, Themes, and Core Vulnerabilities discovered by, or reported to, the Wordfence/Defiant teamCNAVendor, ResearcherUSA
WPScanWordPress core, plugins, and themesCNAVendor, Open SourceFrance
Xen ProjectAll sub-projects under Xen Project’s umbrella (see Xen Project Teams), except those sub-projects that have their own security response process; and the Xen components inside other projects, where Xen Project is the primary developerCNAVendor, Open SourceUK
Xiaomi Technology Co., Ltd.Xiaomi issues onlyCNAVendorChina
XylemXylem products and technologies onlyCNAVendorUSA
Yandex N.V.Yandex issues onlyCNAVendorRussia
Yugabyte, Inc.Yugabyte products onlyCNAHosted Service, VendorUSA
ZabbixZabbix products and Zabbix projects listed on https://git.zabbix.com/ onlyCNAVendorLatvia
Zephyr ProjectZephyr project components, and vulnerabilities that are not in another CNA’s scopeCNAVendor, Open SourceUSA
Zero Day InitiativeProducts and projects covered by its bug bounty programs that are not in another CNA’s scopeCNABug Bounty ProviderJapan
ZGRZGR manufactured productsCNAVendorSpain
Zoom Video Communications, Inc.Zoom and Keybase issues onlyCNAVendorUSA
ZoweVulnerabilities in Zowe.org open source projectsCNAOpen SourceUSA
Zscaler, Inc.Zscaler issues onlyCNAVendorUSA
ZTE CorporationZTE products onlyCNAVendorChina
ZUSO Advanced Research Team (ZUSO ART)Vulnerabilities in third-party products discovered by ZUSO ART that are not in another CNA’s scopeCNAResearcherTaiwan
Zyxel CorporationZyxel products issues onlyCNAVendorTaiwan

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Top 10

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe