Free Online Website Malware Scanner
check website for malware and vulnerability exploits online

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
Normalized URL:  http://cve.mitre.org:80
Submission date: Thu Apr 8 09:11:22 2021
Server IP address: 192.52.194.135
Country: United States
Server: Apache
CMS: proprietary
Malicious files: 0
Suspicious files: 0
Potentially Suspicious files: 0
Clean files: 101
External links detected: 2484
Iframes scanned: 0
Blacklisted: No
SSL Certificate details: Available via API only.

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
/cve/request_id.html#cna_participants
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
164192
File type:
XML
Page/File MD5:
F2C178D45111374A213D23993310019B
Scan duration[sec]:
2.606
/cve/request_id.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
164192
File type:
XML
Page/File MD5:
F2C178D45111374A213D23993310019B
Scan duration[sec]:
1.93
/cve/request_id.html#mitre_cna_lr_pgp_key
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
164192
File type:
XML
Page/File MD5:
F2C178D45111374A213D23993310019B
Scan duration[sec]:
1.907
/cve/request_id.html#cna
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
164192
File type:
XML
Page/File MD5:
F2C178D45111374A213D23993310019B
Scan duration[sec]:
2.24
/cve/request_id.html#cna_lr
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
164192
File type:
XML
Page/File MD5:
F2C178D45111374A213D23993310019B
Scan duration[sec]:
2.042
/working_groups.html#awg
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24190
File type:
XML
Page/File MD5:
EBE7438FF02E50719110C098E9D5E46C
Scan duration[sec]:
0.341
/#
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
22481
File type:
XML
Page/File MD5:
771C4FC95D79C60107565E1148D0D556
Scan duration[sec]:
0.251
/sitemap.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
28876
File type:
XML
Page/File MD5:
10239E3A0EA6A96F61CA63B023A6FB4E
Scan duration[sec]:
0.306
/working_groups.html#cnacwg
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24190
File type:
XML
Page/File MD5:
EBE7438FF02E50719110C098E9D5E46C
Scan duration[sec]:
0.28
/working_groups.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24190
File type:
XML
Page/File MD5:
EBE7438FF02E50719110C098E9D5E46C
Scan duration[sec]:
0.236
/working_groups.html#ocwg
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24190
File type:
XML
Page/File MD5:
EBE7438FF02E50719110C098E9D5E46C
Scan duration[sec]:
0.287
/working_groups.html#spwg
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24190
File type:
XML
Page/File MD5:
EBE7438FF02E50719110C098E9D5E46C
Scan duration[sec]:
0.246
/working_groups.html#qwg
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24190
File type:
XML
Page/File MD5:
EBE7438FF02E50719110C098E9D5E46C
Scan duration[sec]:
0.229
/includest
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
17681
File type:
XML
Page/File MD5:
D7F66D780E9EDF263464A23B96F31DC8
Scan duration[sec]:
0.217
/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
22481
File type:
XML
Page/File MD5:
771C4FC95D79C60107565E1148D0D556
Scan duration[sec]:
0.239
/blog/#
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
26998
File type:
XML
Page/File MD5:
B4E7C6FE4B610B42E45B30ABFED7D18F
Scan duration[sec]:
0.306
/compatible/guidelines.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
38129
File type:
XML
Page/File MD5:
352BAB652E1817E24B75DD55AF09CE9B
Scan duration[sec]:
0.399
/compatible/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
22038
File type:
XML
Page/File MD5:
AFA182B5BE0B92DF501D9DB14B8BDF89
Scan duration[sec]:
0.285
/news/newsletter.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
26674
File type:
XML
Page/File MD5:
18D776AD26F79E9FFDBB6DD7892DA437
Scan duration[sec]:
0.275
/community/sponsor.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24889
File type:
XML
Page/File MD5:
C872ACFC32D8DFEDF0FB925DEA02FDB7
Scan duration[sec]:
0.389
/about/faqs.html#what_is_cve_record
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.24
/about/faqs.html#what_is_cve_id
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.554
/about/faqs.html#cve_record_descriptions_created
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.095
/about/termsofuse.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
19420
File type:
XML
Page/File MD5:
0F3D507C1BB9F33BA9FFFED171C9725F
Scan duration[sec]:
0.194
/about/cve_and_nvd_relationship.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
19422
File type:
XML
Page/File MD5:
F9EC0582B0FC32513A59F7A61931432E
Scan duration[sec]:
0.186
/about/documents.html#cve_list
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
37630
File type:
XML
Page/File MD5:
5C2A29769E4700348CF756D9DF9A8829
Scan duration[sec]:
0.542
/about/faqs.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.425
/about/terminology.html#cve_record
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24603
File type:
XML
Page/File MD5:
856FE98D6C73FCE9805D8E58EA5F6288
Scan duration[sec]:
0.236
/about/terminology.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24603
File type:
XML
Page/File MD5:
856FE98D6C73FCE9805D8E58EA5F6288
Scan duration[sec]:
0.241
/about/faqs.html#what_types_of_products_use_cve
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.558
/about/documents.html#cna_onboarding
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
37630
File type:
XML
Page/File MD5:
5C2A29769E4700348CF756D9DF9A8829
Scan duration[sec]:
0.449
/about/history.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24105
File type:
XML
Page/File MD5:
10DF62D67D1CFD7C7BDCB8C685CE4D8B
Scan duration[sec]:
0.303
/about/terminology.html#tlr-cna
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24603
File type:
XML
Page/File MD5:
856FE98D6C73FCE9805D8E58EA5F6288
Scan duration[sec]:
0.244
/about/terminology.html#vulnerability
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24603
File type:
XML
Page/File MD5:
856FE98D6C73FCE9805D8E58EA5F6288
Scan duration[sec]:
0.262
/about/contactus.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
22089
File type:
XML
Page/File MD5:
81CCBF8D76F8687DF0199C190F56643D
Scan duration[sec]:
0.334
/about/faqs.html#pc_cve_request_web_form
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.173
/about/privacy_policy.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
20880
File type:
XML
Page/File MD5:
52063D921F3F3F4BD6CD4C272F4855A3
Scan duration[sec]:
0.255
/about/documents.html#cna
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
37630
File type:
XML
Page/File MD5:
5C2A29769E4700348CF756D9DF9A8829
Scan duration[sec]:
0.439
/about/getting_started.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
22352
File type:
XML
Page/File MD5:
69A1FD5111B41306B41DE6A9408AE09C
Scan duration[sec]:
0.241
/about/faqs.html#web_form_cveid_rejected
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.167
/about/faqs.html#MITRE_role_in_cve
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.163
/about/terminology.html#secretariat
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24603
File type:
XML
Page/File MD5:
856FE98D6C73FCE9805D8E58EA5F6288
Scan duration[sec]:
0.235
/about/faqs.html#request_blocks_of_cve_ids
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.144
/about/documents.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
37630
File type:
XML
Page/File MD5:
5C2A29769E4700348CF756D9DF9A8829
Scan duration[sec]:
0.404
/about/getting_started.html#cve_list
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
22352
File type:
XML
Page/File MD5:
69A1FD5111B41306B41DE6A9408AE09C
Scan duration[sec]:
0.223
/about/faqs.html#what_is_cve
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.1
/about/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
19649
File type:
XML
Page/File MD5:
F8D95CF6D741DAB0B9A16DB555910E31
Scan duration[sec]:
0.212
/about/faqs.html#cve_record_references
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
87648
File type:
XML
Page/File MD5:
C8C330E87B9E5F0A645C4E3BCA294FB1
Scan duration[sec]:
1.132
/images/GitHub_round_sm
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
3128
File type:
PNG
Page/File MD5:
8C9224B172F8EB4B4C381A67992DAE12
Scan duration[sec]:
0.017
/includes/jquery-migrate-3.0.0.min.js
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
7083
File type:
ASCII
Page/File MD5:
B2D4316164F47C0C1064E7E83DD72167
Scan duration[sec]:
0.134
/includes/jquery-3.2.1.min.js
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
86659
File type:
ASCII
Page/File MD5:
C9F5AEECA3AD37BF2AA006139B935F0A
Scan duration[sec]:
7
/includes/browserheight.js
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
1837
File type:
ASCII
Page/File MD5:
7AF7BBA5B291E9BA5DEF2361B1044A44
Scan duration[sec]:
0.071
/css/main.css
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
16064
File type:
ASCII
Page/File MD5:
C94DD7F6412825989FDAC368A96DDCB7
Scan duration[sec]:
0.233
/css/print.css
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
57
File type:
ASCII
Page/File MD5:
36DF8CD063F1CFDB9063CD79F2098D3E
Scan duration[sec]:
0.032
/podcast/#
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
21692
File type:
XML
Page/File MD5:
0E06549D7F07DFFDCD2530BE2D979BBF
Scan duration[sec]:
0.26
/cve/cna.html#why_become_a_cna_few_requirements
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.318
/cve/cvrf.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
29145
File type:
XML
Page/File MD5:
2DB74F871D5D264FE69228C878D18144
Scan duration[sec]:
0.287
/cve/#
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
21102
File type:
XML
Page/File MD5:
F558A199C811F6F9F132F9C05DE49366
Scan duration[sec]:
0.299
/cve/data_feeds.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
21093
File type:
XML
Page/File MD5:
638A00EC928011CB0497964D56B0416F
Scan duration[sec]:
0.269
/cve/cna.html#become_a_cna
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.304
/cve/search_cve_list.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
18164
File type:
XML
Page/File MD5:
09E985B27885B970962F2200DC3C4CBD
Scan duration[sec]:
0.186
/cve/cna.html#new_cna_onboarding
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.324
/cve/cna.html#why_become_a_cna
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.377
/cve/cna.html#why_become_a_cna_no_cost
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.466
/cve/update_cve_records.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
18780
File type:
XML
Page/File MD5:
0D90BFB29B3D066CA0A3B3BE47FC8284
Scan duration[sec]:
0.223
/cve/cna.html#cnas_growth
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.443
/cve/cna.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.349
/cve/cna.html#cna_types
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.452
/cve/cna.html#why_become_a_cna_benefits
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30879
File type:
XML
Page/File MD5:
0F83256D583D89E8C00D2C5BF65F7F51
Scan duration[sec]:
0.462
/cve/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
21102
File type:
XML
Page/File MD5:
F558A199C811F6F9F132F9C05DE49366
Scan duration[sec]:
0.28
/find/search_tips.html#other_search_resources
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
23272
File type:
XML
Page/File MD5:
4F21BC689F5391585ADA88FE247605D0
Scan duration[sec]:
0.428
/find/search_tips.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
23272
File type:
XML
Page/File MD5:
4F21BC689F5391585ADA88FE247605D0
Scan duration[sec]:
0.244
/find/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
18462
File type:
XML
Page/File MD5:
E327A6F0509F171EDAD2B00829DD8499
Scan duration[sec]:
0.28
/data/downloads/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
24335
File type:
XML
Page/File MD5:
43D2B93E58053DDFD57D4C84C2BBCCB9
Scan duration[sec]:
0.236
/news/archives/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
30715
File type:
XML
Page/File MD5:
C7CB18F3203539E1F17456304692C175
Scan duration[sec]:
0.35
/community/board/#
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
26304
File type:
XML
Page/File MD5:
D8EE953143406769E6FFC4859B8F814F
Scan duration[sec]:
0.306
/community/board/archive.html#board_mail_list_archive
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
70789
File type:
XML
Page/File MD5:
0BEFE3B683EBC59F0ED0E86C8575357E
Scan duration[sec]:
0.714
/community/board/index.html#current_members
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
26304
File type:
XML
Page/File MD5:
D8EE953143406769E6FFC4859B8F814F
Scan duration[sec]:
0.294
/community/board/archive.html#meeting_summaries
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
70789
File type:
XML
Page/File MD5:
0BEFE3B683EBC59F0ED0E86C8575357E
Scan duration[sec]:
0.663
/community/board/charter.html#selection
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
59949
File type:
XML
Page/File MD5:
8892360E3912C81694AE5E4FF28DA176
Scan duration[sec]:
0.682
/community/board/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
26304
File type:
XML
Page/File MD5:
D8EE953143406769E6FFC4859B8F814F
Scan duration[sec]:
0.259
/community/board/charter.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
59949
File type:
XML
Page/File MD5:
8892360E3912C81694AE5E4FF28DA176
Scan duration[sec]:
0.671
/cve/identifiers/#
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
25165
File type:
XML
Page/File MD5:
A02387BAD73B13DD8593302EAC896999
Scan duration[sec]:
0.343
/cve/identifiers/syntaxchange.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
38050
File type:
XML
Page/File MD5:
48AE9FAA35CA61C22E51CDDBB6CD3064
Scan duration[sec]:
0.422
/cve/identifiers/tech-guidance.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
44183
File type:
XML
Page/File MD5:
3CA74303033844EE3D07605435D77B49
Scan duration[sec]:
0.501
/cve/identifiers/index.html#defined
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
25165
File type:
XML
Page/File MD5:
A02387BAD73B13DD8593302EAC896999
Scan duration[sec]:
0.294
/cve/identifiers/index.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
25165
File type:
XML
Page/File MD5:
A02387BAD73B13DD8593302EAC896999
Scan duration[sec]:
0.292
/cve/cna/rules.html#section_7_assignment_rules
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
92242
File type:
XML
Page/File MD5:
56072947379B770D3428E610E0C3A89C
Scan duration[sec]:
1.249
/cve/cna/resources.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
20353
File type:
XML
Page/File MD5:
878F93E99334966DE5C9EFED7C9A7171
Scan duration[sec]:
0.225
/cve/cna/rules.html#section_7-1_what_is_a_vulnerability
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
92242
File type:
XML
Page/File MD5:
56072947379B770D3428E610E0C3A89C
Scan duration[sec]:
1.506
/cve/cna/rules.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
92242
File type:
XML
Page/File MD5:
56072947379B770D3428E610E0C3A89C
Scan duration[sec]:
1.783
/cve/cna/CVE_Program_End_of_Life_EOL_Assignment_Process.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
21408
File type:
XML
Page/File MD5:
45D4109E570F265CCF612A6F352B80D5
Scan duration[sec]:
0.216
/cve/cna/rules.html#Appendix_B_format
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
92242
File type:
XML
Page/File MD5:
56072947379B770D3428E610E0C3A89C
Scan duration[sec]:
1.438
/news/archives/2015/news.html#january132015_First_CVE_IDs_Issued_in_New_Numbering_Format_Now_Available
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
310284
File type:
XML
Page/File MD5:
1CAB07AF0E89DB7B0BA7F54BD8D799A2
Scan duration[sec]:
7.482
/news/archives/2014/news.html#jan152014_New_CVE_ID_Format_in_Effect_as_of_January_1_2014
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
157189
File type:
XML
Page/File MD5:
DF64717F6CA36A7D8B5B3CA4B937C4BF
Scan duration[sec]:
4.199
/news/archives/2017/news.html#january122017_FOCUS_ON%3A_The_Significance_and_Meaning_of_the_Year_Portion_of_a_CVE_Identifier
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
144541
File type:
XML
Page/File MD5:
62F03C56C0C9B8AD998CB0C1C604DD0E
Scan duration[sec]:
1.82
/news/archives/2017/news.html#June272017_FOCUS_ON%3A_Marking_a_CVE_ID_as_REJECT_Is_Not_Permanent_It_Can_Be_Updated_and_Added_to_the_CVE_List
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
144541
File type:
XML
Page/File MD5:
62F03C56C0C9B8AD998CB0C1C604DD0E
Scan duration[sec]:
1.664
/news/archives/2021/news.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
50646
File type:
XML
Page/File MD5:
549ED905F88D4BF709036ACDF90345A5
Scan duration[sec]:
0.742
/news/archives/2021/news.html#April022021_Message_to_DWF_from_the_CVE_Board
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
50646
File type:
XML
Page/File MD5:
549ED905F88D4BF709036ACDF90345A5
Scan duration[sec]:
0.797
/news/archives/2021/news.html#April062021_Minutes_from_CVE_Board_Teleconference_Meeting_on_March_31_Now_Available
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
50646
File type:
XML
Page/File MD5:
549ED905F88D4BF709036ACDF90345A5
Scan duration[sec]:
0.513
/news/archives/2021/calendar.html
Severity:
Clean
Reason:
File is clean
Details:
No significant issues detected.
File size[byte]:
18243
File type:
XML
Page/File MD5:
A735F585F96EDE7357828FA6E54B3970
Scan duration[sec]:
0.275

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7850
http://cve.mitre.org/news/archives/2017/news.html#march142017_flexera_software_and_netgear_added_as_cve_numbering_authorities_cnas
http://cve.mitre.org/news/archives/2014/news.html#november202014_cve_mentioned_in_article_about_increase_in_web_browser_vulnerabilities_in_2014_on_zdnet.com
https://www.qualcomm.com/news/onq/2019/01/16/inside-qualcomm-technologies-vulnerability-rewards-program
http://cve.mitre.org/data/board/archives/2017-05/threads.html
http://www.techweekeurope.co.uk/security/virus/adobe-release-security-patches-160785
http://www.hikvision.com/en/product_1.html
https://www.facebook.com/security/advisories/vulnerability-disclosure-policy
http://cve.mitre.org/images/podcast/how_cve_cisa_and_nist_work_together_to_manage_vulnerabilities.png
https://0xicf.wordpress.com/2014/10/25/zero-day-hole-found-in-samsung-findmymobile-cve-2014-8346/
https://twitter.com/cvenew
http://cve.mitre.org/data/board/archives/2017-02/msg00009.html
http://cve.mitre.org/about/faqs.html#reject_signify_in_cve_record
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-23-january-2019-td1506.html
http://cve.mitre.org/compatible/requirements.html#appendix_a
https://www.oracle.com/support/assurance/vulnerability-remediation/reporting-security-vulnerabilities.html
http://www.theregister.co.uk/2014/04/09/heartbleed_vuln_analysis/
http://cve.mitre.org/data/board/archives/1999-08/msg00034.html
http://cve.mitre.org/data/downloads/allitems.html.gz
http://arstechnica.com/security/2015/05/extremely-serious-virtual-machine-bug-threatens-cloud-providers-everywhere/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2013-4977
https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/contact-information-for-ca-product-vulnerability-response-team.html
https://youtu.be/se-ym_lureq
http://cve.mitre.org/data/board/archives/2014-10/threads.html
http://www.smartnews.ro/software/19043.html
https://source.android.com/security/bulletin
http://cve.mitre.org/news/archives/2017/news.html#august022017_minutes_from_cve_board_teleconference_meeting_on_july_26_now_available
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2590
https://cloud.google.com/support/bulletins/
http://www.infosecurity-magazine.com/news/adobe-patches-critical-flash-flaw/
https://www.hikvision.com/en/policies/vulnerability-disclosure-policy/
http://cve.mitre.org/news/archives/2017/news.html#september142017_minutes_from_cve_board_teleconference_meeting_on_september_6_now_available
http://cve.mitre.org/news/archives/2017/news.html#june272017_focus_on:_marking_a_cve_id_as_reject_is_not_permanent_it_can_be_updated_and_added_to_the_cve_list
http://www.scmagazine.com/freak-vulnerability-can-be-exploited-to-cause-weak-encryption/article/401691/
http://cve.mitre.org/news/archives/2017/news.html#july032017_title
https://www.youtube.com/channel/ucuhd2xfdskh8kjmzqaskpdq/
http://cve.mitre.org/data/board/archives/2014-01/threads.html
http://cve.mitre.org/news/archives/2017/news.html#march302017_minutes_from_cve_board_teleconference_meeting_on_march_8_now_available
https://www.forcepoint.com/
http://www.techworm.net/2014/12/12-million-officehome-routers-vulnerable-misfortune-cookie-attacks.html
http://cve.mitre.org/about/faqs.html#what_is_cve_id
https://web.nvd.nist.gov/view/vuln/detail?vulnid%3Dcve-2015-0469
http://www.scmagazine.com/dhs-notes-rise-in-brute-force-attacks-against-natural-gas-companies/article/301339/
http://cve.mitre.org/cve/identifiers/syntaxchange.html#qa
http://www.ipa.go.jp/index-e.html
http://www.secunia.com/
http://www.silicon.de/41608362/sicherheitsleck-ghost-bedroht-linux-systeme/
http://www.theregister.co.uk/2014/09/28/bash_shellshock_bug_patches_released_by_red_hat/
https://www.icasi.org/cvrf
https://cpr-zero.checkpoint.com/policy/
http://cve.mitre.org/community/sponsor.html
http://www.tripwire.com/state-of-security/vulnerability-management/vert-threat-alert-openssl-vulnerability-advisory-cve-2015-0291-cve-2015-0204/
http://www.webopedia.com/term/t/tls.html
https://trust.salesforce.com/en/security/security-advisories/
https://www.logicool.co.jp/
http://www.eweek.com/
https://www.dhs.gov/cisa/cybersecurity-division/
http://cve.mitre.org/news/archives/2014/news.html#november202014_final_notice_cve_id_in_new_numbering_format_with_5_digits_to_be_assigned_within_weeks
http://www.pressebox.de/pressemitteilung/trend-micro-deutschland-gmbh/jede-20-android-app-verwundbar-trend-micro-warnt-vor-sicherheitsluecke-in-apache-cordova/boxid/740959
http://cve.mitre.org/news/archives/2017/news.html#october262017_minutes_from_cve_board_teleconference_meeting_on_october_18_now_available
http://cve.mitre.org/images/layout/corner_bl.gif
http://cve.mitre.org/data/board/archives/2001-02/threads.html
http://www.networkworld.com/article/2899573/openssl-fixes-serious-denialofservice-bug-11-other-flaws.html
https://talosintelligence.com/
https://duo.com/labs/security-response
http://cve.mitre.org/cve/cna/rules.html
http://cve.mitre.org/data/board/archives/2013-04/threads.html
http://www.cnet.de/88139133/samsungs-ortungsdienst-find-mobile-luecke-erlaubt-angreifern-geraetezugriff/
http://cve.mitre.org/news/archives/2017/news.html#july182017_duo_added_as_cve_numbering_authority_cna
http://cve.mitre.org/data/board/archives/2016-06/msg00024.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/
https://www.iscanonline.com/
http://cve.mitre.org/blog/september152020_cve_program_partners_with_cybersecurity_infrastructure_security_agency_to_protect_industrial_control_systems_and_medical_devices.html
https://www.libreoffice.org/about-us/security
http://threatpost.com/google-adds-grace-period-to-disclosure-policy/111050
http://www.admin5.com/article/20140904/560503.shtml
https://security.opera.com/policy/
https://jenkins.io/security/advisories/
http://cve.mitre.org/data/board/archives/2018-08/msg00019.html
http://cve.mitre.org/blog/october192020_cve_program_report_for_calendar_year_q3-2020.html
https://hackerone.com/hacktivity?querystring%3D&filter%3Dtype:hacker-published&order_direction%3Ddesc&order_field%3Dpopular
http://cve.mitre.org/data/board/archives/2001-06/maillist.html
https://www.coalfire.com/vulnerability-disclosure-policy
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0235
http://cve.mitre.org/data/board/archives/2018-06/msg00000.html
http://www.ubergizmo.com/2015/10/adobe-confirms-critical-vulnerability-in-some-flash-versions/
http://www.digitaltrends.com/mobile/50-million-android-smartphones-vulnerable-heartbleed-bug/
http://www.theregister.co.uk/2015/07/20/windows_microsoft_emergency_patch/
http://cve.mitre.org/data/board/archives/2001-11/threads.html
https://techpageone.dell.com/technology/how-to-get-the-cvss-right/
http://www.digi.no/sikkerhet/2015/03/25/populare-nettsteder-bruker-sarbar-flash-kode
http://cve.mitre.org/cve/request_id.html#cna
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2005.xml
http://cve.mitre.org/news/archives/2015/news.html#february122015_cve_identifier_cve_2015_0313_cited_in_numerous_security_advisories_and_news_media_references_about_a_zero_day_adobe_flash_vulnerability
http://www.version2.dk/artikel/drupal-har-kritisk-saarbarhed-i-sql-69049
http://cve.mitre.org/news/archives/2018/calendar.html
http://nvd.nist.gov/cve-id-syntax-change
http://cve.mitre.org/includes/jquery-3.2.1.min.js
http://www.itu.int/net/home/index.aspx
http://cve.mitre.org/about/documents_archive.html
https://www.incibe-cert.es/en/early-warning/security-advisories/filter/cna
https://vulcoord.cert.org/vulreport/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2882
http://cve.mitre.org/data/board/archives/2016-02/maillist.html
https://access.redhat.com/security/security-updates/#/security-advisories
http://cve.mitre.org/blog/may102017_why_is_a_cve_entry_marked_as_reserved_when_a_cve_id_is_being_publicly_used.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-19-february-2020-td1737.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-6764
http://cve.mitre.org/news/archives/2017/news.html#september52017_minutes_from_cve_board_teleconference_meeting_on_august_23_now_available
http://cve.mitre.org/images/GitHub_round_sm
https://kubernetes.io/cve
https://www.nasa.gov/
http://cve.mitre.org/news/archives/2014/news.html#september092014_cve_mentioned_in_article_about_continuing_threat_of_the_heartbleed_bug_on_csoonline.com
https://cwe.mitre.org/data/definitions/125.html
http://cve.mitre.org/news/archives/2014/news.html#september172014_mitre_issues_press_release_about_upcoming_cve_id_syntax_compliance_deadline
http://www.scmagazine.com/nowsecure-discloses-samsung-swift-keyboard-vulnerability/article/421288/
http://cve.mitre.org/about/faqs.html#date_entry_created_in_cve_entry
https://www.faa.gov/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3699
http://cve.mitre.org/data/board/archives/2016-12/msg00000.html
https://threatpost.com/venom-flaw-in-virtualization-software-could-lead-to-vm-escapes-data-theft/112772
https://www.openwall.com/lists/oss-security
http://www.jbgnews.com/2015/02/third-flaw-exploited-for-adobe-flash-player-in-a-month/463906.html
http://cve.mitre.org/blog/january032019_refresher_when_to_use_the_cve_request_web_form.html
http://cve.mitre.org/cve/cna/cve_record_submission_process_to_mitre_root_only.pptx
http://www.theinquirer.net/inquirer/news/2392473/ghost-in-the-linux-machine-hits-debian-red-hat-and-ubuntu
http://cve.mitre.org/data/board/archives/1999-08/maillist.html
http://www.digitaltrends.com/computing/new-adobe-flash-flaw-allows-remote-takeover-patch-issued/
https://www.google-analytics.com/j/collect?v=1&_v=j89&a=1084886234&t=pageview&_s=1&dl=http%3A%2F%2Fcve.mitre.org%2F&ul=en-us&de=UTF-8&dt=CVE%20-%20CVE&sd=24-bit&sr=800x600&vp=785x600&je=0&_u=IEBAAEABAAAAAC~&jid=1654797918&gjid=1116135361&cid=581444714.1617865893&tid=UA-37948909-1&_gid=252064727.1617865893&_r=1&_slc=1&z=1503529597
http://www.heise.de/security/meldung/immer-aerger-mit-samsung-dienst-find-my-mobile-2435372.html
http://cve.mitre.org/news/archives/2019/calendar.html
http://support.zte.com.cn/support/news/newsmain.aspx
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7871
http://cve.mitre.org/data/board/archives/2003-07/threads.html
http://cve.mitre.org/data/board/archives/2018-03/maillist.html
http://nvd.nist.gov/fdcc/index.cfm
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-1999-0067
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2018.xml
http://cve.mitre.org/data/board/archives/2016-12/threads.html
https://www.dell.com/support/security/en-us
https://amperecomputing.com/product/
http://cve.mitre.org/about/faqs.html#pc_community
https://www.cisco.com/
https://us-cert.cisa.gov/ics/advisories/
http://cve.mitre.org/news/archives/2014/news.html#september092014_cve_mentioned_in_article_about_vulnerabilities_exploited_through_phishing_on_scmagazine.com
http://cve.mitre.org/news/archives/2014/news.html#november052014_cve_identifier_cve-2014-8346_cited-in_numerous_security_advisories_and_news_media_references_about_zero-day_samsung_remote_lock_vulnerability
http://cve.mitre.org/cve/cna/cve_record_github_submission_slides-only.pptx
http://cve.mitre.org/cveidsandhowtogetthem.pdf
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2883
http://cve.mitre.org/news/archives/2009/news.html
http://cve.mitre.org/data/board/archives/2000-10/maillist.html
https://www.intel.com/
http://cve.mitre.org/news/archives/2015/news.html#january142016_xxx
http://cve.mitre.org/data/board/archives/2016-08/msg00013.html
http://cve.mitre.org/data/board/archives/2013-06/maillist.html
https://www.dhs.gov/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2887
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.livemint.com/opinion/zftgphvfmwvxjmfwal1wdj/how-to-stop-the-webs-heart-from-bleeding.html
http://cve.mitre.org/data/board/archives/2015-10/threads.html
http://www.zdnet.com/openssl-fixes-another-severe-vulnerability-7000030253/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-0160
http://cve.mitre.org/data/board/archives/2002-03/maillist.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2738
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3701
https://security.netapp.com/advisory/
https://en.wikipedia.org/wiki/xen
http://www.ambionics.io/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-7169
http://venturebeat.com/2014/04/16/serious-question-who-should-pay-for-heartbleed/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7297
http://cve.mitre.org/data/board/archives/2013-01/maillist.html
https://hackerone.com/adobe
https://github.com/cveproject/strategic-planning-working-group
http://news.softpedia.com/news/google-releases-stagefright-2-0-fix-493799.shtml
https://www.synaptics.com/products/touchpad-family
http://cve.mitre.org/news/archives/2014/news.html#november052014_cve_identifier_cve_2014_3704_cited_in_numerous_security_advisories_and_news_media_references_about_drupal_sql_injection_vulnerability
http://cve.mitre.org/news/archives/2004/news.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3695
http://nakedsecurity.sophos.com/2014/06/06/latest-openssl-flaws-can-lead-to-information-leakage-code-execution-and-dos/
http://cve.mitre.org/data/board/archives/2002-05/maillist.html
http://cve.mitre.org/data/board/archives/2011-12/maillist.html
http://japan.zdnet.com/article/35065196/
http://cve.mitre.org/data/board/archives/2001-08/threads.html
http://cvedev1.mitre.org/news/archives/2017/news.html#june272017_focus_on:_marking_a_cve_id_as_reject_is_not_permanent_it_can_be_updated_and_added_to_the_cve_list
http://www.eweek.com/security/apple-fixes-os-x-and-ios-flaws-ahead-of-new-releases.html
http://techupdates.com/go/918945
http://cve.mitre.org/data/board/archives/2007-01/maillist.html
http://ko.com.ua/uyazvimost_android_pozvolyaet_obhodit_mehanizm_sop_107074
https://www.suse.com/support/update/
http://cve.mitre.org/news/archives/2014/news.html#jan152014_hillstone_networks_makes_declaration_of_cve_compatibility
http://blog.trendmicro.com/trendlabs-security-intelligence/mediaserver-takes-another-hit-with-latest-android-vulnerability/
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3456
https://bounty.github.com/#rules
http://cve.mitre.org/data/board/archives/2002-01/threads.html
https://www.af.mil/
http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-update-trend-micro-discovers-new-java-zero-day-exploit/
http://cve.mitre.org/news/archives/2009/calendar.html
http://cve.mitre.org/blog/iaugust292019_become_a_cna_to_assign_your_own_cve_ids.html
https://www.marklogic.com/security-reporting/
http://www.first.org/cvss/
http://cve.mitre.org/data/downloads/allitems.html
http://www.scmagazine.com/assume-drupal-7-sites-are-compromised-unless-patched-or-updated-to-732-within-hours/article/380303/
http://japanese.engadget.com/2015/07/27/android-95-mms/
https://sick.com/psirt#advisories
https://threatpost.com/hotel-internet-gateways-patched-against-remote-exploit/111829
http://cve.mitre.org/data/board/archives/2001-09/maillist.html
http://cve.mitre.org/news/archives/2015/news.html#april102015_cve_mentioned_in_article_about_an_exploit_targeting_the_middle_east_energy_industry_on_zdnet
https://www.intertek.com/cybersecurity/ewa-canada/
http://cve.mitre.org/images/medium.png
https://www.icasi.org/
http://www.scmagazine.com/additional-bugs-plague-infusion-pumps-dhs-fda-say/article/414808/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3233
http://wpvulndb.com/
http://cve.mitre.org/cve/edcommentary.html#cve_specific
http://nvd.nist.gov/cpe.cfm
http://cve.mitre.org/news/archives/2015/news.html#january082015_cve_identifier_cve_2014_9390_cited_in_an_article_about_a_git_source_code_management_system_vulnerability_on_eweek
https://cveform.mitre.org/
http://cve.mitre.org/data/board/archives/2006-06/threads.html
http://www.computerweekly.com/news/4500246265/venom-is-serious-but-no-heartbleed-say-experts
http://www2.fidelissecurity.com/e/11392/4-heartbleed-cliff-notes--html/vtg8l/474370179
https://www.php.net/changelog-7.php
https://www.krcert.or.kr/krcert/secnoticelist.do
http://cve.mitre.org/data/board/archives/2011-09/maillist.html
http://cve.mitre.org/data/board/archives/2013-04/maillist.html
https://www.zerodayinitiative.com/advisories/disclosure_policy/
https://www.sierrawireless.com/company/security/report-an-issue/
http://cve.mitre.org/news/archives/2017/news.html#july182017_minutes_from_cve_board_teleconference_meeting_on_july_12_now_available
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3689
http://opensource.com/government/14/11/6-tips-adopting-open-source
http://www.heise.de/security/meldung/die-rueckkehr-einer-totgeglaubten-flash-luecke-2583746.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7037
http://cve.mitre.org/cve/images/cve-ids.png
https://security.opera.com/advisories/
https://www.microsoft.com/
http://cve.mitre.org/cve/request_id.html
http://cve.mitre.org/data/board/archives/2017-02/maillist.html
https://grahamcluley.com/2015/03/freak-attack-what-is-it-heres-what-you-need-to-know/
https://www.logitech.com/
http://www.itespresso.fr/securite-it-os-x-apple-automatique-85633.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-10-june-2020-td1802.html
http://cve.mitre.org/cve/cna/cve_entry_creation_ja.pptx
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7835
http://cve.mitre.org/data/board/archives/2012-09/maillist.html
http://www.scmagazine.com/adobe-warns-flash-users-of-zero-day-vulnerability/article/395957/
https://threatpost.com/emergency-adobe-flash-zero-day-patch-arrives-ahead-of-schedule/115073/
https://www.cve-search.org/
https://jpn.nec.com/security-info/policy_en.html
http://cve.mitre.org/data/board/archives/2015-12/threads.html
http://www.eweek.com/security/cisco-redefines-how-it-manages-communicates-security-issues.html
https://technet.microsoft.com/library/security/ms15-apr
https://www.qnap.com/en-us/security-advisory
http://cve.mitre.org/data/board/archives/2000-06/threads.html
http://cve.mitre.org/news/archives/2021/news.html#march222021_deepsurface_added_as_cve_numbering_authority_cna
http://cve.mitre.org/community/index.html
http://cve.mitre.org/cve/cna.html#why_become_a_cna
http://www.theregister.co.uk/2015/01/28/ghost_linux_megavuln_analysis/
http://cve.mitre.org/blog/january272021_introducing_the_we_speak_cve_podcast.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-19-august-2020-tt1880.html
http://cve.mitre.org/cve/cna/cve_program_rbp_policy_v1-2.pdf
https://openeuler.org/en/security/vulnerability-reporting/
http://threatpost.com/new-openssl-mitm-flaw-affects-all-clients-some-server-versions/106470
http://cve.mitre.org/cvename.cgi?name%3Dcve-2015-7015
https://security.samsungmobile.com/securityreporting.smsb
http://cve.mitre.org/data/board/archives/2000-08/msg00013.html
http://www.zdnet.com/article/reconnaissance-malware-wave-strikes-energy-sector/
http://www.scmagazine.com/jpmorgan-chase-customers-targeted-in-massive-phishing-campaign/article/367615/
https://www.kb.cert.org/vuls/bypublished/desc/
https://www.isc.org/community/report-bug/
https://swift.org/support/security.html
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2001.xml
http://cve.mitre.org/news/archives/2014/news.html#october012014_cve_identifier_cve_2014_6271_cited_in_numerous_security_advisories_and_news_media_references_about_bash_shellshock
http://cve.mitre.org/data/board/archives/2015-01/threads.html
http://cve.mitre.org/news/archives/2017/news.html#july032017_important:_cve_identifier_cve_id_reference_updates_begin_july_10_2017
https://www.f-secure.com/documents/996508/1030743/threat_report_h2_2014
https://threatpost.com/microsoft-patches-71-flaws-two-under-attack-warns-of-leaked-xbox-live-cert/115601/#sthash.9yfjfg9q.dpuf
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1538
http://cve.mitre.org/working_group_documents/cnacwg_charter_version_1.2.pdf
http://japan.zdnet.com/article/35062183/
http://cve.mitre.org/news/archives/2006/news.html
http://cve.mitre.org/data/board/archives/2012-10/maillist.html
http://cve.mitre.org/news/archives/2017/news.html#march092017_cve_launches_new_cve_cwe_capec_page_on_linkedin
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7857
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-6271
https://www.cisco.com/c/en/us/about/security-center/security-vulnerability-policy.html
https://trust.zscaler.com/security-advisories
http://cve.mitre.org/data/board/archives/2001-07/maillist.html
http://www.computerworld.com/article/2901313/flashbased-vulnerability-lingers-on-many-websites-three-years-later.html
https://wpscan.com/plugins
http://www.scmagazine.com/crucial-vulnerability-could-compromise-at-least-200-router-models/article/389149/
https://www.qualys.com/research/top10/
http://cve.mitre.org/compatible/compatible.html
http://cve.mitre.org/blog/august292019_become_a_cna_to_assign_your_own_cve_ids.html
https://technet.microsoft.com/en-us/library/security/ms14-065.aspx
http://cve.mitre.org/podcast/episode_2_how-mongodb-manages-its-cves.mp3
https://nvd.nist.gov/products
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1011
http://www.zdnet.com/article/patched-adobe-flex-sdk-vulnerability-remains-threat-to-web-domains/
http://cve.mitre.org/data/board/archives/2017-05/msg00036.html
http://cve.mitre.org/news/archives/2014/news.html#jan152014_new_cve_id_format_in_effect_as_of_january_1_2014
http://www.scmagazineuk.com/under-fire-google-tweaks-bug-disclosure-policy/article/398322/
https://twcert.org.tw/subpages/servethepublic/public_document.aspx
http://cve.mitre.org/working_groups.html#cnacwg
http://cve.mitre.org/news/archives/2017/news.html#july132017_minutes_from_cve_board_teleconference_meeting_on_june_28_now_available
http://cve.mitre.org/news/archives/2014/news.html#apr172014_1_product_from_altex_soft_now_registered_as_officially_cve-compatible
https://cybersecurityworks.com/zerodays-vulnerability-list/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-9222
https://www.blackberry.com/us/en/services/blackberry-product-security-incident-response/report-an-issue
http://www.zdnet.com/article/enterprise-placed-at-risk-by-ios-sandbox-vulnerability/
http://www.eweek.com/security/openssl-finds-and-fixes-7-new-security-flaws.html
http://cve.mitre.org/data/board/archives/2015-09/threads.html
https://github.com/advisories
http://www.theregister.co.uk/2015/03/24/wind_turbine_blown_away_by_csrf_vulnerability/
http://www.malavida.com/noticias/descubierto-un-fallo-que-afecta-al-75-de-los-dispositivos-android-003960
https://techdocs.broadcom.com/us/product-content/news/vulnerability-alerts/vulnerability-alerts---view-all.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-5-august-2020-tt1856.html
http://www.viewtrust.com/
https://kb.isc.org/docs/aa-00861
https://www.sans.org/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3726
https://hclpnpsupport.hcltech.com/csm?id%3Dsearch&spa%3D1&t%3Dkb&q%3Dsecurity%20bulletin
http://www.eweek.com/security/apple-patches-critical-backdoor-flaw-in-os-x-10.10.3.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0863
http://cve.mitre.org/blog/july202017_come_meet_with_cve_at_black_hat_2017_on_july_27_and_def_con_25_on_july_28.html
http://cve.mitre.org/cve/data_feeds.html
http://www.hp.com/country/us/en/uc/welcome.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-16dec2020-tt1932.html
http://cve.mitre.org/data/board/archives/2018-06/maillist.html
https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/contact-information-for-ca-product-vulnerability-response-team.html
http://cve.mitre.org/news/archives/2015/news.html#november242015_cve_mentioned_in_article_about_multiple_network_time_protocol_ntp_vulnerabilities_on_eweek
http://cve.mitre.org/about/faqs.html#what_is_cve_entry
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1130
http://cve.mitre.org/about/contactus.html
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2002.xml
http://www.theregister.co.uk/2014/06/05/openssl_bug_batch/
http://cve.mitre.org/data/board/archives/2017-05/msg00082.html
http://thehackernews.com/2014/10/samsung-find-my-mobile-flaw-allows.html
https://www.nortonlifelock.com/content/dam/nortonlifelock/pdfs/other-resources/guidelines-for-security-vulnerability-reporting-and-response-en.pdf
https://www.splunk.com/page/securityportal
http://www.infosecurity-magazine.com/news/google-blinks-first-with-project/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1157
https://capec.mitre.org/
http://cve.mitre.org/images/key_asterisk_single.png
http://cve.mitre.org/news/archives/2014/news.html#january132015_xxx
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-3mar2021-tt1970.html
https://mattermost.com/security-updates/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1539
http://www.zdnet.com/article/security-vuln-allows-android-app-tampering-through-single-url-click/
https://www.google.com/about/appsecurity/android-rewards/
http://en.kioskea.net/news/25695-apple-pushing-mac-update-automatically
http://cve.mitre.org/docs/docs-2016/cve_request_web_form_tip_sheet.pdf
https://www.mitsubishielectric.com/en/psirt/index.html
https://niap.nist.gov/
http://cve.mitre.org/cve/cna/rbp_policy_v1-1.pdf
http://cve.mitre.org/data/board/archives/2016-05/maillist.html
http://cve.mitre.org/about/faqs.html#what_types_of_products_use_cve
https://bdaily.co.uk/advice/28-04-2014/what-heartbleed-can-teach-businesses-about-information-security/
http://news.softpedia.com/news/apache-cordova-glitch-allows-tampering-with-mobile-app-behavior-482561.shtml
http://www.breathecast.com/articles/apple-new-mac-os-x-update-automatic-patch-combats-hacker-22904/
https://wpscan.com/vulnerability-disclosure-policy
http://cve.mitre.org/news/archives/2017/news.html#october132017_netapp_added_as_cve_numbering_authority_cna
https://nakedsecurity.sophos.com/2015/09/08/anatomy-of-a-malicious-email-recent-word-hole/
http://cve.mitre.org/news/archives/2014/news.html#may012014_cve_mentioned_in_preface_of_march/april_2014_issue_of_crosstalk:_the_journal_of_defense_software_engineering
https://trust.arcgis.com/en/security-concern/
http://cve.mitre.org/news/newsletter.html
http://continuousassurance.org/swamp/swamp-heartbleed-white-paper-29apr2014.pdf
http://info.hpenterprisesecurity.com/lp_456590_cross_cyberriskfullreport_0115_gate?src%3Dpressrelease
https://www.amd.com/en/corporate/product-security
http://www.techworm.net/2015/01/ghost-vulnerability-in-gnu-c-library-can-be-exploited-remotely-to-hijack-the-linux.html
http://www.emc.com/index.htm?fromglobalselector
http://cve.mitre.org/blog/march092017_now_you_can_easily_comment_on_cve_blog_posts_using_our_new_cve_cwe_capec_page_on_linkedin.html
http://www.networkworld.com/article/2949910/microsoft-subnet/microsoft-issues-critical-out-of-band-patch-for-flaw-affecting-all-windows-versions.html
https://nvd.nist.gov/cve-id-syntax-change
https://github.com/nodejs/security-advisories
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-30-sept-2020-tt1904.html
http://cve.mitre.org/about/faqs.html
https://www.lenovo.com/
http://www.infosecurity-magazine.com/news/admins-urged-to-patch-linux-ghost/
http://cve.mitre.org/cve/cna/cve_program_inactive_cna_policy_v1-2.pdf
https://github.com/aliasrobotics/rvd
http://cve.mitre.org/news/archives/2017/news.html#january122017_focus_on:_the_significance_and_meaning_of_the_year_portion_of_a_cve_identifier
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-4879
https://success.trendmicro.com/solution/1105726-supported-products-trend-micro
http://cve.mitre.org/news/archives/2017/news.html#february232017_1_product_from_avatares_foundation_now_registered_as_officially_cve_compatible
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5916
http://www.techspot.com/news/58240-apple-releases-patch-to-fix-shellshock-bug-in-os-x.html
https://www.suse.com/support/security/
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2013.xml
http://www.pcworld.com/
https://technet.microsoft.com/en-us/library/security/ms14-dec.aspx
http://www.pcmag.com/article2/0,2817,2479034,00.asp
https://www.netapp.com/
http://cve.mitre.org/find/index.html
https://under-linux.org/content.php?r%3D9002
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7852
http://cve.mitre.org/news/archives/2015/news.html#september152015_cve_mentioned_in_article_about_a_microsoft_word_vulnerability_being_exploited_via_email_on_naked_security
http://www.cbronline.com/news/cybersecurity/data/does-the-bite-live-up-to-the-hype-10-insights-into-the-venom-vulnerability-4577567
http://cve.mitre.org/about/documents.html#cna_cve_record_submissions
http://cve.mitre.org/news/archives/2003/news.html
http://www.darkreading.com/black-hat/black-hat-asia-2015-target-malware/d/d-id/1319228?_mc%3Drss_dr_edt
http://cve.mitre.org/data/board/archives/2015-09/maillist.html
http://www.tripwire.com/state-of-security/security-awareness/hacker-halted-what-is-it/
http://cve.mitre.org/news/archives/2017/news.html#february172017_notice:_cve_request_web_form_outage_from_6pm_7pm_edt_on_february_21
https://www.youtube.com/embed/nxqcjq2-doc
http://www.networkworld.com/article/2862233/exploits-for-dangerous-network-time-protocol-vulnerabilities-can-compromise-systems.html
http://cve.mitre.org/news/archives/2015/news.html#november32015_new_cve_editorial_board_member_for_red_hat
http://cve.mitre.org/news/archives/2015/news.html#january132015_first_cve_ids_issued_in_new_numbering_format_now_available
https://support.forcepoint.com/login
http://cve.mitre.org/news/archives/2014/news.html#may152014_cve_cwe_and_capec_are_main_topics_of_article_about_the_heartbleed_bug_on_mitres_cybersecurity_blog
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2876
http://cve.mitre.org/blog/september112018_a_look_at_the_cve_and_cvss_relationship.html
https://help.github.com/en/articles/searching-code
http://www.eweek.com/blogs/security-watch/adobe-patches-36-flaws-including-a-zero-day-in-flash-player.html
http://cve.mitre.org/about/documents.html#cna_assignment_corrections_and_cve_entry_updates
https://platform.twitter.com/js/moment~timeline.7f2de50df57dde7729820a2b5e16f8ba.js
http://cve.mitre.org/data/board/archives/2001-10/msg00000.html
https://platform.twitter.com/widgets/widget_iframe.e16c6ecf9d86005b77fc7c17beced5d8.html?origin=http%3A%2F%2Fcve.mitre.org
https://docs.broadcom.com/doc/brocade-security-vulnerabiltiy-disclosure.pdf
http://cve.mitre.org/news/archives/2015/news.html
http://www.infoworld.com/article/2899123/security/older-openssl-versions-vulnerable-to-freak-attack.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-4640
https://www.openssl.org/policies/secpolicy.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-6278
http://cve.mitre.org/news/archives/2010/calendar.html
http://www.cnet.com/news/internets-security-bug-tracker-faces-its-y2k-moment/
https://www.mozilla.org/en-us/security/advisories/mfsa2015-66/
https://www.incibe.es/reporte-vulnerabilidades-cna
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-18-march-2020-td1745.html
http://cve.mitre.org/data/board/archives/2017-06/threads.html
http://cve.mitre.org/data/board/archives/2001-03/msg00014.html
http://cve.mitre.org/news/archives/2015/news.html#december102015_cve_mentioned_in_article_about_microsoft
http://cve.mitre.org/data/board/archives/2001-04/threads.html
http://cve.mitre.org/data/board/archives/2012-10/threads.html
http://cve.mitre.org/news/archives/2013/news.html#may032013a
http://www.techworld.com/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2889
http://nvd.nist.gov/cce/index.cfm
http://cve.mitre.org/about/faqs.html#pc_board
https://www.virusbtn.com/blog/2015/02_05.xml
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3824
http://www.eweek.com/security/new-zero-day-exploit-adds-to-adobe-flash-security-woes.html
http://www.scmagazineuk.com/cisco-develops-new-and-improved-security-disclosure-process/article/443429/
https://amperecomputing.com/security-at-ampere/
https://www.elastic.co/community/security
http://www.interition.net/
http://cve.mitre.org/about/documents.html#cna_policies
http://cve.mitre.org/news/archives/2017/news.html#august222017_qnap_added_as_cve_numbering_authority_cna
https://www.autodesk.com/trust/security-advisories
http://cve.mitre.org/blog/april062021_we_speak_cve_podcast_episode_3_-_partnering_with_the_cve_program.html
http://cve.mitre.org/data/board/archives/2000-06/maillist.html
https://web.nvd.nist.gov/view/vuln/detail?vulnid%3Dcve-2014-9295
http://cve.mitre.org/news/archives/1999/news.html
http://www.nsfocus.com/
http://cve.mitre.org/data/board/archives/2017-06/maillist.html
http://cve.mitre.org/compatible/questionnaires/173.pdf
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3036
http://cve.mitre.org/blog/march052020_cna_rules_version_3.0_now_in_effect.html
https://about.gitlab.com/security/disclosure/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7110
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0459
http://cve.mitre.org/data/board/archives/2017-08/msg00000.html
http://www.proximis.com/
http://arstechnica.com/security/2015/06/patch-early-patch-often-adobe-pushes-emergency-fix-for-active-0-day/
http://cve.mitre.org/about/terminology.html#secretariat
http://cve.mitre.org/news/archives/2021/news.html#january152021_minutes_from_cve_board_teleconference_meeting_on_january_6_now_available
https://www.sierrawireless.com/company/security/archive/
http://www.zdnet.de/88229624/vor-vier-jahren-gepatchte-adobe-schwachstelle-bedroht-website-besucher/
http://cve.mitre.org/working_group_documents/spwg_charter_version_1.3.pdf
http://cve.mitre.org/data/board/archives/2001-07/threads.html
https://psirt.global.sonicwall.com/vuln-list
http://cve.mitre.org/compatible/questionnaires/32.html
http://cve.mitre.org/news/archives/2015/news.html#april292015_cve_identifiers_used_throughout_f_secures_threat_report_2014
http://www.linux-magazin.de/news/android-browser-luecke-verursacht-privacy-disaster
http://cve.mitre.org/data/board/archives/2018-02/threads.html
http://cve.mitre.org/news/archives/2015/news.html#july232015_cve_identifier_cve_2015_2426_cited_in_numerous_security_advisories_and_news_media_references_about_a_zero_day_microsoft_windows_vulnerability
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2886
http://cve.mitre.org/news/archives/2021/news.html#march022021_mautic_added_as_cve_numbering_authority_cna
https://www.odoo.com/security-report
http://cve.mitre.org/working_group_documents/cnacwg_charter_version_1.3.pdf
http://cve.mitre.org/cve/request_id.html#cna_lr
https://www.mautic.org/mautic-security-team/mautic-security-advisory-policy
http://cve.mitre.org/data/board/archives/2017-08/maillist.html
http://cve.mitre.org/news/archives/2017/news.html#january262017_new_cve_board_member_from_black_duck_software
http://cve.mitre.org/blog/august182020_our_cve_story_rapid7.html
http://cve.mitre.org/data/refs/index.html#reference_maps
https://oval.cisecurity.org/
https://www.rapid7.com/db/
http://cve.mitre.org/cve/identifiers/syntaxchange.html#background
http://cve.mitre.org/data/downloads/allitems.csv.gz
http://cve.mitre.org/cve/cna.html
http://darkmatters.norsecorp.com/tag/apache-cordova/
http://cve.mitre.org/news/archives/2014/news.html#feb062014_viewtrust_technology_makes_declaration_of_cve_compatibility
http://cve.mitre.org/docs/docs-2000/cerias.html
http://cve.mitre.org/blog/february122021_ken_munro_of_pen_test_partners_joins_cve_board.html
http://cve.mitre.org/news/archives/2017/news.html#february142017_notice:_cve_request_web_form_outage_from_8_p.m._10_p.m._edt_on_february_15
https://tools.cisco.com/security/center/resources/vendor_vulnerability_policy.html
https://www.debian.org/security/#dsas
http://cve.mitre.org/data/board/archives/2016-03/threads.html
http://cve.mitre.org/blog/august032018_come_meet_with_cve_at_black_hat_2018_def_con_26_on_august_9.html
https://access.redhat.com/security/team/contact
http://cve.mitre.org/about/getting_started.html#cve_board
http://www.symantec.com/security_response/publications/threatreport.jsp
http://www.techweekeurope.co.uk/news/openssl-patch-heartbleed-146886
http://cve.mitre.org/data/board/archives/2016-11/maillist.html
http://www.eweek.com/security/verizon-data-breach-study-finds-little-change-in-attack-patterns.html
http://cve.mitre.org/data/board/archives/2001-07/msg00000.html
https://pivotal.io/security
http://www.technologyreview.com/view/531286/why-the-shellshock-bug-is-worse-than-heartbleed/
https://www.jaybirdsport.com/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-3704
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1012
http://cve.mitre.org/data/board/archives/2016-09/maillist.html
http://www.computerworld.com/article/2862138/exploits-for-dangerous-network-time-protocol-vulnerabilities-can-compromise-systems.html
https://www.first.org/cvss
http://cve.mitre.org/data/downloads/allitems.csv
http://cve.mitre.org/data/board/archives/2003-03/maillist.html
http://www.eweek.com/security/microsoft-patches-33-vulnerabilities-in-november-patch-tuesday-update.html
https://trust.salesforce.com/en/security/responsible-disclosure-policy
http://cve.mitre.org/news/archives/2015/news.html#february042015_1_product_from_beijing_netpower_technologies_now_registered_as_officially_cve_compatible
https://support.f5.com/csp/article/k4602
http://cve.mitre.org/data/board/archives/2016-10/msg00042.html
http://cve.mitre.org/data/board/archives/2018-08/threads.html
http://cve.mitre.org/data/board/archives/2013-06/msg00000.html
http://www.techworm.net/2015/07/stagefright-attack-it-takes-only-a-single-text-message-to-hack-an-android-smartphone.html
http://cve.mitre.org/compatible/guidelines.html#online_capability_guidelines
http://cve.mitre.org/cve/cna/cve_program_eol_policy_v1-1.pdf
http://cve.mitre.org/data/board/archives/2003-04/threads.html
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2004.xml
http://cve.mitre.org/news/archives/2014/news.html#november202014_wpscan_makes_declaration_of_cve_compatibility
http://www.forbes.com/sites/thomasbrewster/2015/07/27/android-text-attacks/
http://weblogit.net/2015/07/27/stagefright-android-offen-wie-ein-scheunentor-71250/
http://cve.mitre.org/data/board/archives/2018-07/msg00009.html
https://www.energy.gov/
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-4nov-2020-tt1916.html
https://www.first.org/cvss/v3/development
http://cve.mitre.org/news/archives/2017/news.html#may162017_notice:_cve_request_web_form_outage_from_8_p.m._12_p.m._edt_on_may_20
http://cve.mitre.org/images/layout/corner_ur.gif
https://www.powerpage.org/adobe-pushes-flash-player-18-0-0-194-cites-security-vulnerabilities-in-previous-versions/
https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
https://vuls.cert.org/confluence/display/wiki/vulnerability+disclosure+policy
http://cve.mitre.org/news/archives/2015/news.html#july72015_cve_mentioned_in_article_about_drupal_vulnerabilities_on_naked_security
http://cve.mitre.org/news/archives/2021/news.html#february092021_minutes_from_cve_board_teleconference_meeting_on_february_3_now_available
http://www.crosstalkonline.org/storage/issue-archives/2014/201403/201403-0-issue.pdf
http://cve.mitre.org/news/archives/2015/news.html#april232015_cve_mentioned_in_how_to_get_the_cvss_right_article_on_dells_tech_page_one_blog
http://cve.mitre.org/cve/researcher_reservation_guidelines
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-4-september-2019-td1641.html
https://www.synology.com/en-global/support/security
https://www.iso.org/standard/72311.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-28oct-2020-tt1911.html
https://www.mcafee.com/
http://branchez-vous.com/2015/10/01/stagefright-2-0-les-appareils-android-nouveau-vulnerables/
http://cve.mitre.org/about/faq.html#b1
http://cve.mitre.org/podcast/
https://www.secomea.com/cybersecurity-advisory/
http://cve.mitre.org/data/board/archives/2014-05/maillist.html
http://cve.mitre.org/news/archives/2017/news.html#june292017_cve_adds_3_new_cve_numbering_authorities_cnas_netflix_trend_micro_and_zero_day_initiative
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-17april-2019-td1556.html
https://jpn.nec.com/security-info/index.html
http://cve.mitre.org/news/archives/2015/news.html#may282015_cve_mentioned_in_article_about_logjam_vulnerability_on_securityweek
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1275
https://github.com/facebook/
http://cve.mitre.org/images/search_icon.png
https://www.flexera.com/products/operations/software-vulnerability-research/secunia-research/disclosure-policy.html?_ga%3D2.126100429.1927534686.1582843801-707336045.1578583910
https://www.se.com/ww/en/work/support/cybersecurity/report-a-vulnerability.jsp
http://www.scmagazine.com/buffer-overflow-vulnerability-in-linux-identified/article/395025/
http://www.cso.com.au/article/565327/adobe-patches-another-0-day-flash-used-infect-dailymotion-visitors/
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-0224
http://cve.mitre.org/news/archives/2017/news.html#july112017_zte_added_as_cve_numbering_authority_cna
http://cve.mitre.org/about/getting_started.html#cve_id_request
http://www.malaysiandigest.com/technology/525207-samsung-find-my-mobile-flaw-allows-hacker-to-remotely-lock-your-device.html
http://cve.mitre.org/about/faq.html#a2
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3043
http://www.alibaba.com/
http://cve.mitre.org/data/board/archives/2000-09/maillist.html
http://cve.mitre.org/data/board/archives/2016-04/maillist.html
http://www.networkworld.com/community/blog/biased-software-vulnerability-stats-praising-microsoft-was-101-misleading
http://cve.mitre.org/data/board/archives/1999-12/maillist.html
http://cve.mitre.org/news/archives/2017/news.html#april202017_schneider_electric_added_as_cve_numbering_authority_cna
http://cve.mitre.org/about/cve_and_nvd_relationship.html
https://advisory.teradici.com/security-advisories/
https://www.forcepoint.com/company/innovation/product-security-report-issue
https://www.tenable.com/security
http://cve.mitre.org/cve/cna.html#cnas_growth
http://www.icasi.org/cvrf-1-1-mindmap/
http://cve.mitre.org/news/archives/2015/news.html#april232015_cve_mentioned_in_article_about_verizons_2015_data_breach_investigations_report_on_eweek
http://cve.mitre.org/data/board/archives/2004-03/threads.html
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2012.xml
http://cve.mitre.org/data/board/archives/2016-07/msg00001.html
http://cve.mitre.org/data/board/archives/2001-08/maillist.html
http://cve.mitre.org/about/
http://cve.mitre.org/data/board/archives/2000-09/threads.html
https://www.kaldata.com/index.php?action%3Dnews&%3Btag%3Ddrupal-7
http://cve.mitre.org/about/faqs.html#pc_cve_records
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1155
https://www.symantec.com/
http://cve.mitre.org/data/board/archives/2018-06/msg00003.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2426
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3678
http://androidheadlines.com/2015/02/nowsecure-provides-fix-for-serious-vulnerabilities-found-in-80-percent-of-samsung-devices-last-year.html
http://cve.mitre.org/news/archives/2014/news.html#mar172014_1_product_from_nsfocus_now_registered_as_officially_cve-compatible
https://platform.twitter.com/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1271
https://www.bluedon.com/
https://www.airbus.com/
http://www.v3.co.uk/v3-uk/news/2388048/apple-issues-first-automatic-os-x-security-update
http://cve.mitre.org/blog/august022017_become_a_cna
http://cve.mitre.org/news/archives/2015/news.html#december102015_cve_included_in_itu%e2%80%99s_security_in_telecommunications_and_information_technology_2015
http://cve.mitre.org/news/archives/2021/news.html#march082021_important_message_about_cve_id_assignment
http://cve.mitre.org/news/archives/2018/news.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-31mar2021-tt1979.html
http://cve.mitre.org/compatible/alerts_announcements.html
https://support.hpe.com/hpesc/public/docdisplay?doclocale%3Den_us&docid%3Da00100637en_u
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2011.xml
http://www.informationweek.com/government/cybersecurity/shellshock-bug-6-key-facts--/d/d-id/1316131
http://thefootballexaminer.com/technology-22/samsung-find-my-mobile-does-not-fall-for-the-first-time-on-uncomfortable-5881.html
http://cve.mitre.org/community/board/archive.html#meeting_summaries
http://cve.mitre.org/data/board/archives/2000-10/threads.html
https://www.qualys.com/
https://nakedsecurity.sophos.com/2015/01/29/the-ghost-vulnerability-what-you-need-to-know/
https://github.com/cloudflare/
https://www.drupal.org/
http://www.capitalwired.com/new-shellshock-patches-released-after-bash-bug-spoiled-thousands-of-sites/23091/
http://cve.mitre.org/data/board/archives/2012-12/threads.html
http://cve.mitre.org/data/board/archives/2017-03/msg00016.html
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2007.xml
https://www.mitsubishielectric.com/en/psirt/vulnerability/index.html
https://ics-cert.us-cert.gov/
https://support.kaspersky.com/general/vulnerability.aspx?el%3D12429#block0
http://cve.mitre.org/news/archives/2017/news.html#april202017_minutes_from_cve_board_teleconference_meeting_on_april_5_now_available
http://www.zdnet.com/sql-injection-flaw-opens-drupal-sites-to-attack-7000034719/
http://www.scmagazine.com/apt-group-exploits-adobe-flash-player-zero-day-in-phishing-operation/article/422352/
http://www.cisco.com/
http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/
http://cve.mitre.org/about/faqs.html#pc_using_the_cve_list
http://cve.mitre.org/data/downloads/allitems.txt.z
http://cve.mitre.org/data/board/archives/2001-01/threads.html
http://www.scmagazine.com/apache-cordova-patches-application-vulnerability/article/417257/
https://cert.vde.com/en-us/advisories
http://punto-informatico.it/4274025/pi/news/stagefright-20-torna-paura-android.aspx
http://cve.mitre.org/includes/browserheight.js
http://cve.mitre.org/news/archives/2015/news.html#march272015_1_product_from_toolswatch_now_registered_as_officially_cve_compatible
http://cve.mitre.org/images/compatible.gif
http://cve.mitre.org/cve/cna/rules.html#appendix_b_format
https://www.ea.com/security/disclosure
https://www.broadcom.com/support/security-center/vulnerability-management
https://threatpost.com/stagefright-2-0-vulnerabilities-affect-1-billion-android-devices/114863/
http://thevarguy.com/network-security-and-data-protection-software-solutions/060614/openssl-bitten-another-security-bug
http://cve.mitre.org/data/board/archives/2016-07/threads.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5860
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7858
http://www.theinquirer.net/inquirer/news/2393383/adobe-flash-zero-day-flaw-exploited-again
https://craftercms.org
https://security.360.cn/en/advisory.html
http://cve.mitre.org/news/archives/2015/news.html#march032015_cve_ids_used_throughout_article_about_hps_cyber_risk_report_2014_on_techworld
http://cve.mitre.org/data/board/archives/2016-10/msg00003.html
http://cve.mitre.org/news/archives/2014/news.html#november202014_cve_mentioned_throughout_article_about_microsoft%e2%80%99s_november_patch_tuesday_on_eweek.com
http://cve.mitre.org/news/archives/2017/news.html#september142017_1_product_from_bluedon_foundation_now_registered_as_officially_cve_compatible
http://www.newnettechnologies.com/
https://www.lenovo.com/us/en/product-security/vulnerability-disclosure-policy
http://cve.mitre.org/news/archives/2015/news.html#september152015_cve_mentioned_in_article_about_seagate_patching_3_backdoor_vulnerabilities_on_eweek
http://cve.mitre.org/data/downloads/allitems.xml.z
http://www.eweek.com/security/heartbeat-ssl-flaw-puts-linux-distros-at-risk.html/
http://cve.mitre.org/data/board/archives/2018-12/threads.html
http://www.zte.com.cn/
http://www.reuters.com/article/2014/12/23/us-apple-cybersecurity-iduskbn0k108w20141223
https://www.defcon.org/html/defcon-25/dc-25-index.html
http://cve.mitre.org/news/archives/2014/news.html#september252014_cve_identifier_cve_2014_6041_cited_in_numerous_security_advisories_and_news_media_references_about_the_android_privacy_vulnerability
https://www.ibm.com/
https://www.linkedin.com/company/11033649
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0240
http://cve.mitre.org/data/board/archives/2018-03/msg00001.html
http://cve.mitre.org/data/index.html
http://www.net-security.org/malware_news.php?id%3D2955
http://cve.mitre.org/news/archives/2015/news.html#december102015_cve_mentioned_in_article_about_two_critical_javascript_vulnerabilities_on_infoworld
http://cve.mitre.org/news/archives/2017/news.html#february282017_drupal.org_added_as_cve_numbering_authority_cna
http://venturebeat.com/2015/10/14/adobe-confirms-new-critical-flash-vulnerability-is-being-exploited-in-targeted-attacks-promises-patch-next-week/
http://bgr.com/2015/10/16/adobe-flash-player-security-vulnerability-patch-download/
https://www.dia.mil/
https://github.com/otrs/otrs/blob/rel-6_0/security.md
https://www.huawei.com/en/psirt/vul-response-process
http://cve.mitre.org/news/archives/2017/news.html#march232017_siemens_added_as_cve_numbering_authority_cna
https://support.hpe.com/portal/site/hpsc/public/kb/secbullarchive/
http://cve.mitre.org/data/board/archives/2018-09/msg00005.html
https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html
https://www.nist.gov/index.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-9295
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2737
https://youtu.be/13b5cuzr7cq
http://www.ibtimes.co.uk/adobe-admits-critical-vulnerability-flash-player-19-0-0-207-earlier-versions-1524229
https://wiki.ubuntu.com/securityteam/faq#contact
http://www.itpro.co.uk/data-loss-prevention/25014/microsoft-issues-emergency-software-patch-one-week-ahead-of-windows-10
http://cve.mitre.org/news/archives/2015/news.html#april232015_cve_mentioned_in_article_about_microsofts_patch_tuesday_for_april_on_sc_magazine
http://cve.mitre.org/find/search_tips.html
http://lxer.com/module/newswire/view/200736/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3827
http://cve.mitre.org/data/board/archives/2002-08/threads.html
https://nvd.nist.gov
https://www.synopsys.com/blogs/software-security/
http://securitygladiators.com/2015/05/29/apache-cordova-vulnerability-lets-hackers-change-apps-behavior/
http://thenextweb.com/insider/2015/08/03/a-huge-dns-exploit-could-take-down-chunks-of-the-internet/
http://cve.mitre.org/news/archives/2021/news.html#january122021_wpscan_added_as_cve_numbering_authority_cna
http://cve.mitre.org/news/archives/2021/news.html#march232021_minutes_from_cve_board_teleconference_meeting_on_march_17_now_available
https://psirt.global.sonicwall.com/vuln-policy
http://cve.mitre.org/data/downloads/allitems-cvrf-year-1999.xml
http://cve.mitre.org/news/archives/2017/news.html#march022017_cve_launches_twitter_feed_of_newest_cve_ids
http://cve.mitre.org/images/key_asterisk_double.png
http://cve.mitre.org/news/archives/2017/news.html#august162017_minutes_from_cve_board_teleconference_meeting_on_august_9_now_available
http://cve.mitre.org/images/twitter.jpg
http://cve.mitre.org/data/board/archives/2017-11/msg00025.html
http://cve.mitre.org/data/board/archives/2002-07/maillist.html
http://cve.mitre.org/news/archives/2015/news.html#march272015_cve_identifier_cve_2011_2461_cited_in_numerous_security_advisories_and_news_media_references_about_a_still_exploitable_4_year_old_adobe_flex_vulnerability
http://www.infosecurity-magazine.com/news/freak-show-rocks-security-industry/
http://www.darkreading.com/vulnerabilities---threats/new-ghost-vuln-affecting-linux/d/d-id/1318811
https://gitlab.com/gitlab-org/cves
https://oval.mitre.org/repository/about/other_repositories.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0829
http://www.c114.net/security/4355/a859199.html
http://cve.mitre.org/news/archives/2016/news.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2874
https://www.drupal.org/security
http://cve.mitre.org/data/board/archives/2012-03/maillist.html
http://www.eweek.com/security/ghost-bug-not-new-but-can-haunt-older-linux-versions.html
https://github.com/nodejs/
http://cve.mitre.org/news/archives/2021/news.html#february042021_swift_project_added_as_cve_numbering_authority_cna
http://cve.mitre.org/data/board/archives/2012-11/maillist.html
http://cve.mitre.org/cve/cna/rules.html#appendix_b
http://www.itworldcanada.com/post/another-sll-vulnerability-discovered
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7851
https://www.crowdstrike.com/
http://www.theregister.co.uk/2015/01/27/glibc_ghost_vulnerability/
https://www.oracle.com/corporate/security-practices/assurance/vulnerability/disclosure.html
http://cve.mitre.org/data/board/archives/2018-05/threads.html
http://cve.mitre.org/data/board/archives/1999-11/maillist.html
https://www.rapid7.com/
https://security.gallagher.com/responsible-disclosure-policy
http://cve.mitre.org/cve/identifiers/compliant_organizations.html
http://www.heise.de/newsticker/meldung/android-smartphones-ueber-kurznachrichten-angreifbar-2763764.html
http://cve.mitre.org/cve/cna/becoming_a_cna_ja.pptx
http://www.darkreading.com/vulnerabilities-and-threats/the-month-of-android-vulnerabilities-rolls-on/d/d-id/1321849
https://www.autodesk.com/trust/incident-response
http://cve.mitre.org/cve/identifiers/index.html#defined
http://cve.mitre.org/docs/docs-2016/cve_request_web_form_overview.pdf
https://edk2-docs.gitbook.io/security-advisory/
http://www.zdnet.de/88209378/luecke-samsungs-find-mobile-dienst-erlaubt-angreifern-geraetezugriff/
https://www.xylem.com/en-us/about-xylem/cybersecurity/advisories?page%3D1&pagesize%3D24&categories%3D1324
https://www.sophos.com/en-us/press-office/press-releases/2021/01/sophos-named-common-vulnerability-and-exposure-numbering-authority.aspx
http://cve.mitre.org/compatible/questionnaires/165.html
http://cve.mitre.org/data/board/archives/2018-10/msg00017.html
http://cve.mitre.org/data/board/archives/2012-09/threads.html
https://www.kb.cert.org/vuls/id/177092
http://www.infosecurity-magazine.com/news/blackenergy-attacks-on-critical/
https://www.nvidia.com/en-us/security/psirt-policies/
http://cve.mitre.org/cvename.cgi?name%3Dcve-2015-7106
http://cve.mitre.org/news/archives/2015/news.html#september242015_cve_mentioned_in_article_about_vulnerabilities_fixed_by_apple
https://nlnetlabs.nl/projects/nsd/security-advisories/
https://securityadvisories.paloaltonetworks.com
http://www.ipa.go.jp/security/ciadr/vul/20150721-ms.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5122
https://www.mautic.org/tag/security-announcement
http://techpp.com/2015/07/21/microsoft-security-update-font/
http://cve.mitre.org/about/terminology.html
http://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/security-standards-help-stop-heartbleed
http://cve.mitre.org/news/archives/2006/calendar.html
https://obdev.at/cve/published-vulnerabilities.html
https://cve.mitre.org/data/board/archives/2013-06/msg00005.html
http://cve.mitre.org/cve/identifiers/
http://www.jpcert.or.jp/pr/2014/pr140006.html
http://cve.mitre.org/data/board/archives/2015-06/threads.html
http://cve.mitre.org/data/board/archives/2017-04/maillist.html
https://community.flexera.com/t5/flexnet-publisher-knowledge-base/tkb-p/fnp-knowledge/label-name/vulnerability
http://tidbits.com/article/15116
http://cve.mitre.org/data/board/archives/2013-03/threads.html
https://github.com/nodejs
http://www.networkworld.com/article/2894746/microsoft-subnet/march-2015-patch-tuesday-5-of-14-rated-critical-and-microsoft-issues-a-fix-for-freak.html
https://www.wallofsheep.com/pages/dc25#dadinolfi
http://www.slashgear.com/linux-c-library-exploit-affects-all-systems-dating-back-2000-28366406/
http://www.cert-ist.com/
http://arstechnica.com/security/2015/02/google-updates-disclosure-policy-after-windows-os-x-zero-day-controversy/
http://cve.mitre.org/data/board/archives/2001-01/maillist.html
http://cve.mitre.org/data/board/archives/2017-03/threads.html
http://cve.mitre.org/about/faqs.html#what_is_cve_identifier
https://wpscan.com/themes
https://github.com/netapp
https://www.projectcalico.org/security-bulletins/
https://support.f5.com/csp/knowledge-center/security
http://cve.mitre.org/data/board/archives/2000-02/maillist.html
http://www.cio-today.com/article/index.php?story_id%3D021000q2vjni
http://cve.mitre.org/news/archives/2015/news.html#january302015_cve_identifier_cve_2015_0235_cited_in_numerous_security_advisories_and_news_media_references_about_ghost_vulnerability
https://youtu.be/jqyq-mxlo-u
https://youtu.be/nxqcjq2-doc
http://cve.mitre.org/news/archives/2017/news.html#march162017_cve_launches_@cveannounce_twitter_feed
http://cve.mitre.org/news/archives/2015/news.html#october12015_upcoming_changes_to_cve
http://arstechnica.com/security/2015/10/joomla-bug-puts-millions-of-websites-at-risk-of-remote-takeover-hacks/
https://knowledge.autodesk.com/support
http://cve.mitre.org/data/board/archives/2013-04/msg00074.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-20-march2019-td1544.html
http://www.netpower.com.cn/
http://cve.mitre.org/news/archives/2021/news.html#march022021_simplinx_added_as_cve_numbering_authority_cna
http://en.wikipedia.org/wiki/cvss
http://cve.mitre.org/news/archives/2017/news.html#june122017_atlassian_added_as_cve_numbering_authority_cna
http://www.qianjia.com/html/2014-09/09_237630.html
https://manage.busyconf.com/events/sourceboston2017/activities/581388353dd949129f00000d
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2006-3459
http://www.darkreading.com/attacks-breaches/cylance-researchers-discover-critical-vulnerability-affecting-hotel-chains-worldwide/d/d-id/1319644
https://github.com/cveproject/cve-services/blob/dev/contributing.md
http://www.csoonline.com/article/2688716/vulnerabilities/attacks-against-shellshock-continue-as-updated-patches-hit-the-web.html
http://cve.mitre.org/data/board/archives/2016-07/msg00005.html
https://advisory.teradici.com/disclosure-policy/
https://github.com/tianocore/tianocore.github.io/wiki/reporting-security-issues
http://cve.mitre.org/data/board/archives/2018-02/msg00000.html
http://cve.mitre.org/data/board/archives/2013-02/threads.html
https://git.zabbix.com/
http://cve.mitre.org/data/board/archives/2017-05/maillist.html
http://www.cio-today.com/article/index.php?story_id%3D0030003h7793
https://ubuntu.com/security/disclosure-policy
http://www.newsfactor.com/story.xhtml?story_id%3D102007yxk1au
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2021.xml
http://www8.hp.com/us/en/software-solutions/cyber-risk-report-security-vulnerability/index.html?jumpid%3Dreg_r1002_usen_c-001_title_r0001
http://cve.mitre.org/data/board/archives/2016-11/threads.html
http://cve.mitre.org/data/board/archives/2013-11/threads.html
http://cve.mitre.org/about/faqs.html#cve_entry_references
http://cve.mitre.org/data/board/archives/2017-01/msg00038.html
http://cve.mitre.org/data/board/archives/2017-03/msg00017.html
http://cve.mitre.org/news/archives/2015/news.html#february042015_1_product_from_wpscan_now_registered_as_officially_cve_compatible
http://cve.mitre.org/cve/cna/cve_record_github_submission_slides-only.png
http://cve.mitre.org/data/board/archives/2004-09/threads.html
http://cve.mitre.org/index.html
http://cve.mitre.org/data/board/archives/2000-07/threads.html
http://cve.mitre.org/blog/november042016_whats_your_opinion_on_how_descriptions_are_used_in_cve_ids.html
http://cve.mitre.org/blog/october212020_our_cve_story_cve_ids_for_simplifying_vulnerability_communications.html
https://www.hpe.com/h41268/live/index_e.aspx?qid%3D11503
http://cve.mitre.org/about/privacy_policy.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-4878
https://mattermost.com/security-vulnerability-report/
http://cve.mitre.org/data/board/archives/2000-12/threads.html
http://cve.mitre.org/data/board/archives/2016-02/threads.html
http://cve.mitre.org/data/board/archives/2016-09/msg00004.html
http://cve.mitre.org/data/board/archives/2017-11/maillist.html
http://cve.mitre.org/data/board/archives/2002-10/maillist.html
https://www.pentestpartners.com/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3687
https://www.cerias.purdue.edu/
https://www.gsa.gov/
https://www.zephyrproject.org/
http://cve.mitre.org/news/archives/2017/news.html#may102017_important_cve_will_reject_a_group_of_unused_cve_ids_on_may_11
http://www.itu.int/itu-t/recommendations/rec.aspx?rec%3D11061
http://cve.mitre.org/news/archives/2014/news.html#october012014_new_net_technologies_makes_declaration_of_cve_compatibility
https://www.dell.com/support/contents/us/en/04/article/product-support/self-support-knowledgebase/security-antivirus/alerts-vulnerabilities/dell-vulnerability-response-policy
http://cve.mitre.org/data/board/archives/2000-08/threads.html
http://cve.mitre.org/compatible/guidelines.html#security_service_guidelines
http://cve.mitre.org/data/board/archives/2006-09/threads.html
https://youtu.be/miov_x18dve
http://cve.mitre.org/blog/july292020_cve_program_report_for_calendar_year_q2-2020.html
http://cve.mitre.org/news/archives/2017/news.html#june012017_synology_added_as_cve_numbering_authority_cna
http://cve.mitre.org/cve/edcommentary.html#january132015_cve_ids_posted_today_for_the_first_time_using_the_new_id_syntax
http://cve.mitre.org/data/board/archives/2012-07/maillist.html
http://cve.mitre.org/news/archives/2017/news.html#february102017_minutes_from_cve_board_teleconference_meeting_on_january_25_now_available
http://www.computerweekly.com/news/4500248673/adobe-patches-flash-player-vulnerability-cve-2015-3113
https://register.mitre.org/saworkshop/
http://cve.mitre.org/data/board/archives/2012-06/maillist.html
https://security.oppo.com/en/mend.html
http://www.theregister.co.uk/2014/11/03/drupal_drupalgeddon_analysis/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-9390
http://cve.mitre.org/data/board/archives/2015-08/maillist.html
http://media.scmagazine.com/documents/147/hacking-iot-a-case-study-on-ba_36649.pdf
http://cve.mitre.org/compatible/index.html
http://cve.mitre.org/data/board/archives/1999-09/threads.html
http://www.techsupportforum.com/forums/f90/trend-micro-discovers-apache-cordova-vulnerability-that-allows-one-click-modification-1000193.html
http://cve.mitre.org/data/board/archives/1999-05/threads.html
http://www.eweek.com/security/seagate-patches-for-3-backdoor-security-vulnerabilities.html
http://securitytracker.com/
http://www.ithome.com.tw/news/94799
https://www.bitdefender.com/support/security-advisories
http://www.golem.de/news/security-schwere-sicherheitsluecke-in-drupal-7-1410-109890.html
http://cve.mitre.org/data/board/archives/2018-07/msg00013.html
http://www.itnews.com.au/news/new-stagefright-bug-menaces-over-a-billion-android-devices-409972
http://mashable.com/2015/05/13/venom-security-faq/
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-8-july-2020-tt1814.html
https://psirt.bosch.com/security-advisories/
https://twcert.org.tw/subpages/servethepublic/public_document.aspx?lang%3Den-us
http://www.zdnet.com/shellshock-makes-heartbleed-look-insignificant-7000034143/
http://cve.mitre.org/about/faqs.html#pc_cve_request_web_form
http://cve.mitre.org/data/board/archives/2015-05/threads.html
http://www.tomsguide.com/us/apple-ntp-patch,news-20057.html
http://cve.mitre.org/data/board/archives/2011-11/threads.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-8346
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-22january-2020-td1699.html
http://cve.mitre.org/data/board/archives/2018-09/maillist.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-6041
http://cve.mitre.org/about/faqs.html#pc_intro
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5368
http://cve.mitre.org/data/board/archives/2017-09/maillist.html
https://puppet.com/security/cve/security-vulnerability-announcements
http://siliconangle.com/blog/2015/05/14/venom-vulnerability-bites-vm-hosts/
http://cve.mitre.org/includes/jquery-migrate-3.0.0.min.js
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3682
http://cve.mitre.org/about/faqs.html#year_portion_of_cve_id
https://github.com/netflix/
http://cve.mitre.org/news/archives/2017/news.html#may042017_expanding_and_improving_cve_talk_at_egc_group_meeting_on_may_18
http://cve.mitre.org/data/board/archives/2000-01/threads.html
https://github.com/alibaba/disclosure/blob/main/readme.md
http://www.nsa.gov/ia/_files/os/win7/win7_security_highlights.pdf
http://cve.mitre.org/compatible/questionnaires/167.html
http://nvd.nist.gov/home.cfm
http://cve.mitre.org/news/archives/2015/news.html#march032015_cve_mentioned_in_article_about_firefox_vulnerabilities_on_the_register
http://www.computerworld.com/article/2839240/zero-day-in-samsung-find-my-mobile-service-allows-attacker-to-remotely-lock-phone.html
http://www.infosecurity-magazine.com/news-features/information-security-industry/
http://cve.mitre.org/compatible/questionnaires/161.html
http://www.techtimes.com/articles/32973/20150216/google-relaxes-project-zero-90-day-deadline-other-companies-can-breathe-now.htm
http://cve.mitre.org/news/archives/2015/news.html#june032015_cve_identifier_cve_2015_1835_cited_in_numerous_security_advisories_and_news_media_references_about_the_apache_cordova_android_vulnerability
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-8346
http://www.webopedia.com/term/s/ssl.html
http://www.websense.com/assets/reports/report-2015-threat-report-en.pdf
https://nlnetlabs.nl/projects/rpki/security-advisories/
http://cve.mitre.org/data/board/archives/2017-03/maillist.html
http://www.net-security.org/secworld.php?id%3D18142
http://cve.mitre.org/blog/december022016_summary_of_your_feedback_about_how_descriptions_are_used_in_cve_ids.html
https://www.youtube.com/embed/rrnyeunsxoy
http://cve.mitre.org/blog/november182019_cve_program_report_for_calendar_year_q3-2019.html
http://www.theregister.co.uk/2015/02/24/samba_remote_execution_vuln/
https://support.apple.com/en-us/ht201220
http://cve.mitre.org/news/archives/2015/news.html#december102015_cve_mentioned_in_article_about_apple%e2%80%99s_december_security_fixes_for_os_x_and_ios_on_eweek
http://cve.mitre.org/data/board/archives/2012-05/maillist.html
https://www.tcpdump.org/security.html
https://www.eclipse.org/security/known.php
http://cve.mitre.org/news/archives/2014/news.html#november202014_cve_mentioned_in_article_about_a_vulnerability_undetected_for_19_years_on_newsfactor.com
http://cve.mitre.org/data/board/archives/2017-01/maillist.html
https://www.atlassian.com
https://www.freebsd.org/
http://cve.mitre.org/news/archives/2014/news.html#december182014_cve_mentioned_in_article_about_adopting_open_source_on_gcn.com
http://cve.mitre.org/blog/march032021_we_speak_cve_podcast_episode_2_-_how_mongodb_manages_its_cves.html
http://cve.mitre.org/data/board/archives/2001-06/threads.html
http://cve.mitre.org/data/board/archives/2018-11/threads.html
http://cve.mitre.org/compatible/questionnaires/166.html
http://cve.mitre.org/news/archives/2017/news.html#august022017_alibaba_added_as_cve_numbering_authority_cna
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-9295
http://cve.mitre.org/data/board/archives/2017-10/maillist.html
http://cve.mitre.org/news/archives/2014/news.html#september252014_cve_mentioned_in_article_about_vehicle_traffic_sensor_vulnerabilities
https://www.jpmorganchase.com
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-18nov-2020-tt1923.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3680
http://cve.mitre.org/data/board/archives/2015-07/maillist.html
http://techfrag.com/2015/06/17/samsung-devices-vulnerable-hackers-attacks/
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2010.xml
http://www.pianetacellulare.it/articoli/apple/36639_apple-aggiorna-mac-in-automatico-senza-chiedere-agli-utenti.php
http://cve.mitre.org/news/archives/2015/news.html#may192015_cve_identifier_cve_2015_3456_cited_in_numerous_security_advisories_and_news_media_references_about_the_venom_vulnerability
http://cve.mitre.org/images/cna_rules/figure_2_cna_cve_id_lifecycle.png
http://cve.mitre.org/blog/december152020_our_cve_story_using_the_cve_program_to_provide_reliable_vulnerability_information.html
http://cve.mitre.org/data/board/archives/2015-07/threads.html
https://www.dahuasecurity.com/support/cybersecurity/response
https://cert.vde.com/en-us/services
http://cve.mitre.org/data/board/archives/2017-10/threads.html
https://duo.com/labs/disclosure
http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/
http://cve.mitre.org/news/archives/2015/news.html#february122015_2nd_product_from_beijing_netpower_technologies_now_registered_as_officially_cve_compatible
http://www.itnews.com.au/news/396298,apple-patches-os-x-mavericks-against-shellshock-flaw.aspx?utm_source%3Dfeed&%3Butm_medium%3Drss&%3Butm_campaign%3Deditors_picks
http://cve.mitre.org/news/archives/2017/news.html#august022017_slides_from_cve_ids_and_how_to_get_them_talk_at_def_con_25_now_available
http://arstechnica.com/security/2015/03/openssl-warns-of-two-high-severity-bugs-but-no-heartbleed/
http://www.zaikei.co.jp/article/20151004/272192.html
http://web.nvd.nist.gov/view/vuln/detail?vulnid%3Dcve-2014-0751
http://news.softpedia.com/news/openssl-s-undisclosed-high-severity-issue-is-far-from-freak-poodle-or-heartbleed-476254.shtml
http://cve.mitre.org/news/archives/2017/news.html#november072017_booz_allen_hamilton_added_as_cve_numbering_authority_cna
http://cve.mitre.org/data/board/archives/2018-11/msg00003.html
http://filippo.io/heartbleed/
http://cve.mitre.org/data/board/archives/2012-01/maillist.html
http://www.itproportal.com/2014/06/06/new-openssl-bugs-uncovered-in-the-wake-of-heartbleed/
https://platform.twitter.com
http://www.infosecurity-magazine.com/news/google-releases-patches-for/
https://github.com/cveproject
http://cve.mitre.org/images/nvd-logo.png
http://cve.mitre.org/news/archives/2015/news.html#july232015_cve_mentioned_in_article_about_adobe_microsoft_and_oracle_zero_day_vulnerabilities_on_eweek
https://security.360.cn/en/policy.html
http://cve.mitre.org/news/archives/2021/calendar.html
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2015.xml
http://www.theregister.co.uk/2014/12/18/misfortune_cookie/
http://blogs.cisco.com/security/streamlining-the-response-to-security-vulnerabilities
http://cve.mitre.org/data/board/archives/2018-01/maillist.html
http://www.netgear.com/about/security/
http://cve.mitre.org/images/layout/corner_br.gif
http://www.adobe.com/
https://www.sap.com/
http://www.cbronline.com/news/security/apple-rolls-out-first-ever-automated-security-update-241214-4477252
http://www.security-next.com/052257
http://cve.mitre.org/cve/cna/cve_program_end_of_life_eol_assignment_process_v1-1.pdf
https://cwe.mitre.org/data/definitions/130.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2739
http://cve.mitre.org/data/board/archives/2018-08/maillist.html
http://cve.mitre.org/about/faqs.html#pc_cna
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1280
http://www.techworld.com/news/security/top-software-exploit-of-2014-stuxnet-xp-flaw-from-2010-reckons-hp-3599147/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7854
http://cve.mitre.org/cve/cna/rules.html#section_8_cve_entry_requirements
http://cve.mitre.org/data/board/archives/2018-04/msg00017.html
http://arstechnica.com/security/2015/10/new-zero-day-exploit-hits-fully-patched-adobe-flash/
http://cve.mitre.org/data/board/archives/2013-06/threads.html
http://betanews.com/2015/01/27/warning-linux-is-being-haunted-by-a-g-g-g-ghost-vulnerability-are-you-at-risk/
http://cve.mitre.org/news/archives/2017/news.html#may222017_ambionics_security_makes_declaration_of_cve_compatibility
http://cve.mitre.org/community/board/index.html#past_members
https://www.se.com/ww/en/work/support/cybersecurity/vulnerability-policy.jsp
http://cve.mitre.org/data/board/archives/2000-04/threads.html
http://www.oracle.com/us/sun/index.html
http://cve.mitre.org/news/archives/2021/news.html#march152021_cve_blog_publishes_article_authored_by_cve_community_member_and_independent_researcher_cna_larry_cashdollar
http://cve.mitre.org/cve/cna/cve_program_end_of_life_eol_assignment_process.html
http://cve.mitre.org/news/archives/2015/news.html#may282015_cve_mentioned_in_article_about_webkit_vulnerabilities_in_safari_browser_on_threatpost
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0313
http://cve.mitre.org/about/documents.html
https://github.com/atlassian/
https://www.circl.lu/services/cve-search/
http://cve.mitre.org/news/archives/2017/news.html#march162017_minutes_from_cve_board_teleconference_meetings_on_february_8_and_february_22_now_available
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2017.xml
https://deepsurface.com/vulnerability-disclosure-policy/
http://cve.mitre.org/news/archives/2015/news.html#september152015_cve_mentioned_in_article_about_vulnerabilities_in_hp_pcs_laptops_and_tablets_on_techworm
https://twitter.com/cveannounce
http://cve.mitre.org/css/print.css
http://cve.mitre.org/community/board/index.html#current_members
http://cve.mitre.org/news/archives/2015/news.html#october132015_cve_included_in_ciscos_recently_updated_vulnerability_disclosure_process
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-6277
https://medium.com/@cve_program
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3672
http://www.scmagazine.com/venom-vulnerability-enables-virtual-machine-escapes/article/414549/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1286
http://cve.mitre.org/data/board/archives/2001-02/maillist.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1154
http://www.cerias.purdue.edu/
https://www.tibco.com/services/support/advisories
https://github.com/cveproject/automation-working-group
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-17mar2021-tt1976.html
http://cve.mitre.org/cve/edcommentary.html
https://nvd.nist.gov/vuln-metrics/cvss#
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0932
http://cve.mitre.org/data/board/archives/2016-08/msg00000.html
https://youtu.be/qtjogifmmf4
http://www.techweekeurope.co.uk/
http://cve.mitre.org/news/archives/2017/news.html#october252017_node.js_added_as_cve_numbering_authority_cna
http://cve.mitre.org/news/archives/2021/news.html#march022021_xylem_added_as_cve_numbering_authority_cna
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-15-april-2020-td1759.html
http://cve.mitre.org/news/archives/2015/news.html#april102015_cve_mentioned_in_article_about_a_critical_backdoor_flaw_in_os_x_10.10.3_on_eweek
https://scap.nist.gov/
http://cve.mitre.org/data/board/archives/2016-11/msg00010.html
https://www.pega.com/trust/security-advisories
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-6271
http://enterpriseinnovation.net/article/singapore-based-cyber-security-team-reveals-china-based-threat-group-1115225494
https://nvd.nist.gov/fdcc/index.cfm
http://cve.mitre.org/data/board/archives/2017-12/msg00025.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-6332
http://cve.mitre.org/images/podcast/how_mongodb_manages_its_cves.png
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-2dec2020-tt1929.html
http://www.evdoinfo.com/content/view/4896/64/
https://yandex.com/bugbounty/
http://cve.mitre.org/news/archives/2015/calendar.html
http://cve.mitre.org/data/board/archives/2018-01/threads.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3698
http://cve.mitre.org/news/archives/2015/news.html#march032015_cve_mentioned_in_article_about_an_apple_macintosh_vulnerability_on_techlicious
http://www.linkbynet.ca/
http://www.theregister.co.uk/2015/02/26/mozilla_swats_17_bugs_in_firefox_36/
http://cve.mitre.org/news/archives/2017/news.html#march062017_notice_cve_request_web_form_outage_from_8:00_p.m._10:00_p.m._edt_on_march_8
https://security-center.intel.com/
http://cve.mitre.org
http://cve.mitre.org/data/board/archives/2000-04/maillist.html
http://cve.mitre.org/data/board/archives/2004-03/maillist.html
http://www.eweek.com/enterprise-apps/mozilla-fixes-flaws-with-firefox-39-previews-firefox-40.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-4114
https://www.debian.org/security/
https://cassandra.cerias.purdue.edu/cve_changes/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3232
http://cve.mitre.org/news/archives/2021/news.html#march302021_nec_added_as_cve_numbering_authority_cna
https://www.itu.int/en/pages/default.aspx
https://www.zte.com.cn/global/about/citizenship/product-security/vulnerability-report
http://techday.com/
http://cve.mitre.org/data/board/archives/2005-12/threads.html
https://www.silver-peak.com/support/user-documentation/security-advisories
https://nvd.nist.gov/cvss.cfm
https://www.hillstonenet.com/products/
https://trust.salesforce.com/en/trust-and-compliance-documentation/
http://www.theregister.co.uk/2015/06/29/ransomware_exploit_kit_slinger_exploits_flash_remote_code_execution/
http://cve.mitre.org/news/archives/2015/news.html#august252015_cve_mentioned_in_article_about_a_zero_day_internet_explorer_vulnerability_on_computing
https://snyk.io/vuln/
http://www.esecurityplanet.com/network-security/google-blinks-on-project-zero-security-disclosure.html
http://cve.mitre.org/data/board/archives/2017-07/msg00069.html
http://mybroadband.co.za/news/security/118255-adobe-flash-zero-day-exploit.html
http://cve.mitre.org/about/documents.html#cve_board
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2736
https://www.fortiguard.com/psirt_policy
http://www.eweek.com/security/verizon-security-report-says-attacks-vary-by-industry.html
http://www.silicon.de/41613510/600-millionen-android-smartphones-von-leck-gefaehrdet/
http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf
http://blogs.cisco.com/security/openssl-heartbleed-vulnerability-cve-2014-0160-cisco-products-and-mitigations/
http://www.infosecurity-magazine.com/news/critical-flaw-hits-millions-of/
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2426
http://cve.mitre.org/data/board/archives/2018-11/maillist.html
http://www.automatiseringgids.nl/nieuws/2014/39/cve-systeem-per-2015-aangepast-aan-enorme-groei-patches
http://cve.mitre.org/about/getting_started.html#cna
http://www.itworld.com/security/438790/improved-patch-tackles-new-shellshock-attack-vectors
http://cve.mitre.org/news/archives/2015/news.html#march032015_cve_mentioned_in_article_about_android_corrupdate_vulnerability_on_android_headlines
http://www.cbronline.com/news/cybersecurity/data/four-year-old-flash-bug-returns-from-the-dead-4537880
http://cve.mitre.org/cve/publickey/pubkey.txt
http://www.morningnewsusa.com/android-phones-can-be-hacked-with-just-1-text-2329872.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-100001
http://gcn.com/blogs/cybereye/2014/03/trustworthy-computing.aspx
http://www.zdnet.com/article/you-need-to-apply-the-openssl-patches-today-not-tomorrow/
http://www.net-security.org/secworld.php?id%3D16966
https://www.pega.com/responsible-disclosure-policy
http://www.openwall.com/lists/oss-security/2015/03/19/3
http://cve.mitre.org/data/board/archives/2012-01/threads.html
http://www.eweek.com/security/adobe-fixes-another-zero-day-flaw-in-its-flash-player.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1645
http://cve.mitre.org/news/archives/2014/news.html#apr042014_proximis_makes_declaration_of_cve_compatibility
https://global.abb/group/en/technology/cyber-security/alerts-and-notifications
http://cve.mitre.org/news/archives/2015/news.html#june032015_cve_ids_used_throughout_qualys_top_10_external_and_top_10_internal_vulnerabilities_lists
http://cve.mitre.org/data/board/archives/2016-08/threads.html
http://cve.mitre.org/cve/identifiers/syntaxchange.html
http://cve.mitre.org/data/board/archives/2015-04/maillist.html
https://www.blackhat.com/us-13/speakers/brian-martin.html
https://docs.zephyrproject.org/latest/security/vulnerabilities.html
https://www.mozilla.org/en-us/security/advisories/
http://arstechnica.com/security/2015/01/highly-critical-ghost-allowing-code-execution-affects-most-linux-systems/
http://cve.mitre.org/community/board/index.html
http://fortune.com/2015/05/13/amazon-says-its-cloud-not-bitten-by-venom-flaw/
http://cve.mitre.org/news/archives/2014/news.html#june112014_cve_identifiers_used_throughout_symantecs_2014_internet_security_threat_report
http://cve.mitre.org/news/archives/2015/news.html#september242015_cve_ids_used_throughout_qualys_july_2015_top_10_vulnerabilities_list
http://cve.mitre.org/data/board/archives/2011-12/threads.html
http://cve.mitre.org/data/board/archives/2001-12/maillist.html
http://cve.mitre.org/data/board/archives/2004-09/maillist.html
https://www.redhat.com/
http://cve.mitre.org/working_groups.html#awg
http://www.pcpro.co.uk/news/389161/new-vulnerability-discovered-in-openssl
https://www.arista.com/en/support/advisories-notices
http://cve.mitre.org/news/archives/2017/news.html#may112017_new_cve_board_member_from_lenovo
http://cve.mitre.org/news/archives/2017/news.html#december122017_minutes_from_cve_board_teleconference_meeting_on_november_29_now_available
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-13-may-2020-td1783.html
https://www.symantec.com/security_response/publications/threatreport.jsp
http://cve.mitre.org/news/archives/2015/news.html#july282015_infobyte_networks_makes_declaration_of_cve_compatibility
https://fortune.com/2015/06/17/samsung-galaxy-keyboard-bug/
http://cve.mitre.org/data/board/archives/2017-01/msg00046.html
http://www.techworld.com/news/security/microsoft-confirms-windows-zero-day-bug-3232359/
http://realestatenewsnyc.com/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041/
https://www.jpcert.or.jp/english/vh/2018/20180330-vulpolicy.pdf#search%3D
https://help.github.com/en/articles/about-maintainer-security-advisories
http://cve.mitre.org/cve/cna.html#participating_cnas
http://cve.mitre.org/blog/october132017_cna_rules_version_2.0_to_take_effect_on_january_1st.html
https://www.mcafee.com/enterprise/en-us/threat-center/product-security-bulletins.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-1may2019-td1570.html
http://cve.mitre.org/news/archives/2014/news.html#apr172014_cve_mentioned_in_article_about_secure_software_development_on_networkword.com
http://www.vapidlabs.com/misc/policy.html
http://www.dhs.gov/office-cybersecurity-and-communications
http://cve.mitre.org/news/archives/2015/news.html#august252015_cve_mentioned_in_article_about_a_severe_dns_vulnerability_on_the_next_web
https://cve.naver.com/
http://www.bankinfosecurity.com/shellshock-ddos-attacks-spike-a-7365
http://www.computerworld.com/article/2910316/90-of-security-incidents-trace-back-to-pebkac-and-id10t-errors.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-3feb2021-tt1958.html
https://www.replicated.com/security/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1129
http://www8.hp.com/us/en/hp-news/press-release.html?id%3D1915228&%3Bpagetitle%3Dsecurity-threat-landscape-still-plagued-by-known-issues,-says-hp#.votw4fnf_aw
https://docs.zephyrproject.org/latest/security/security-overview.html#security-vulnerability-reporting
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5477
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5850
http://cve.mitre.org/about/getting_started.html#cve_list
http://cve.mitre.org/news/archives/2014/news.html#may012014_cve_identifier_cve_2014_0160_cited_in_numerous_security_advisories_and_news_media_references_about_the_heartbleed_vulnerability
https://help.github.com/en/articles/understanding-the-search-syntax
https://security.gallagher.com/security-advisories
https://www.eclipse.org/security
http://www.eweek.com/blogs/security-watch/apple-patches-shellshock-as-attacks-continue.html
https://security.netapp.com/policy/
http://cve.mitre.org/images/cvelogobanner.png
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2865
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7084
http://cve.mitre.org/news/archives/2015/news.html#may72015_cve_identifiers_used_throughout_websenses_threat_report_2015
https://www.libreoffice.org/about-us/security/advisories/
http://cve.mitre.org/cve/cna.html#new_cna_onboarding
http://cve.mitre.org/news/archives/2017/news.html#march082017_updated_notice:_cve_request_web_form_outage_rescheduled_to_9:30_p.m._11:30_p.m._edt_on_march_8
http://cve.mitre.org/news/archives/2017/news.html#december042017_new_cve_board_member_from_ibm
https://threatpost.com/android-stagefright-flaws-put-950-million-devices-at-risk/113960
https://cloud.yandex.com/docs/overview/security-bulletins/
http://cve.mitre.org/data/board/archives/1999-05/maillist.html
http://cve.mitre.org/news/archives/2015/news.html#april162015_iscan_online_makes_declaration_of_cve_compatibility
http://cve.mitre.org/about/faqs.html#cve_id_descriptions_created
http://www.chinatopix.com/articles/29342/20141224/apple-pushes-first-automatic-update-mac-os-x.htm
http://cve.mitre.org/cve/cna/assigning_cve_ids.pptx
http://cve.mitre.org/news/archives/2014/news.html#december182014_cve_mentioned_in_article_about_vulnerabilities_in_surveillance_dvrs_on_the_register
http://linustechtips.com/main/topic/216087-metasploit-major-android-bug-is-a-privacy-disaster-cve-2014-6041/
https://www.blackhat.com/us-13/briefings.html#martin
http://cve.mitre.org/news/archives/2017/news.html#december202017_important_message_about_our_@cvenew_twitter_account
http://cve.mitre.org/data/board/archives/2001-05/threads.html
http://cve.mitre.org/about/faqs.html#reserved_signify_in_cve_record
http://cve.mitre.org/news/archives/2017/news.html#january122017_researcher_reservation_guidelines_document_now_available
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3728
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-4641
http://cve.mitre.org/about/termsofuse.html
http://cve.mitre.org/cve/cna/rules.html#section_1-2_cna_program_structure
http://www.cert.org/
http://cve.mitre.org/news/archives/2017/news.html#april252017_ioactive_added_as_cve_numbering_authority_cna
https://www.zte.com.cn/global/products
http://cve.mitre.org/data/board/archives/2013-05/threads.html
http://cve.mitre.org/news/archives/2015/news.html#february122015_toolswatch_makes_declaration_of_cve_compatibility
http://www.tripwire.com/state-of-security/
http://cve.mitre.org/news/archives/2007/news.html
http://www.scmagazineuk.com/millions-of-routers-and-pcs-vulnerable-to-decade-old-cookie-flaw/article/389031/
http://cve.mitre.org/blog/february012021_our_cve_story_learning_to_embrace_recognition_and_mitigations_of_vulnerabilities_as_a_strength.html
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-8-january-2020-td1681.html
http://www.newsfactor.com/
http://cve.mitre.org/news/archives/2003/calendar.html
https://github.com/netapp/
http://www.elconfidencial.com/tecnologia/2014-09-18/un-fallo-de-seguridad-en-android-que-supone-un-desastre-para-la-privacidad_200392/
http://www.infosecurity-magazine.com/
http://cve.mitre.org/news/archives/2012/calendar.html
http://www.techworm.net/2015/06/security-bug-in-cordova-allows-a-single-url-click-to-tamper-android-apps.html
https://www.ntia.doc.gov/files/ntia/publications/ntia_vuln_disclosure_early_stage_template.pdf
http://cve.mitre.org/news/archives/2017/news.html#july242017_tenable_added_as_cve_numbering_authority_cna
http://cve.mitre.org/data/board/archives/2019-01/maillist.html
http://cve.mitre.org/cve/cna.html#why_become_a_cna_no_cost
https://www.streamlabs.com/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2013-4787
http://cve.mitre.org/about/faqs.html#cve_list_retire_term_cve
https://www.synopsys.com/
http://xforce.iss.net/
http://thewestsidestory.net/2014/09/28/17788/bash-shellshock-bugs-new-patch-fixes-everything/
https://youtu.be/rrnyeunsxoy
http://cve.mitre.org/data/board/archives/2001-10/maillist.html
http://cve.mitre.org/news/archives/2017/news.html#september82017_riverbed_and_zephyr_added_as_cve_numbering_authority_cna
https://www.hcltech.com/software/psirt/hcl-software-vulnerability-disclosure-policy
http://www.consumeraffairs.com/news/hackers-breach-public-wi-fi-at-multiple-hotels-and-convention-centers-033015.html
http://cve.mitre.org/news/archives/2015/news.html#april102015_cve_mentioned_in_article_about_stuxnet_on_eweek
http://cve.mitre.org/data/board/archives/1999-06/maillist.html
http://cve.mitre.org/data/board/archives/1999-08/msg00036.html
http://cve.mitre.org/news/archives/2014/news.html#may012014_cve_and_cwe_mentioned_in_article_about_mitigating_risks_of_counterfeit_and_tainted_components_in_march/april_2014_issue_of_crosstalk
http://cve.mitre.org/news/archives/2015/news.html#march032015_cve_mentioned_in_article_about_malware_research_presentations_at_black_hat_asia_2015_on_darkreading.com
http://cve.mitre.org/data/board/archives/2016-12/maillist.html
http://www.scmagazine.com/assume-drupal-7-sites-are-compromised-unless-patched-or-updated-to-732-within-hours/article/380303
http://cve.mitre.org/cve/cna/rules.html#appendix_c_process_to_correct_assignment_issues_update_cve_entries
https://security.nozominetworks.com
http://cve.mitre.org/data/board/archives/2018-12/maillist.html
http://cve.mitre.org/sitemap.html
https://www.youtube.com/embed/se-ym_lureq
http://www.csoonline.com/article/2466726/data-protection/heartbleed-to-blame-for-community-health-systems-breach.html
http://cve.mitre.org/news/archives/2014/news.html#july292014_security_automation_workshop_2014_august_26-28
http://cve.mitre.org/news/archives/2015/news.html#october272015_cve_identifier_cve_2015_7645_cited_in_numerous_security_advisories_and_news_media_references_about_a_zero_day_adobe_flash_vulnerability
http://cve.mitre.org/news/archives/2015/news.html#may282015_cve_mentioned_in_article_about_a_vulnerability_affecting_millions_of_routers_and_iot_devices_on_zdnet
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-17feb2021-tt1960.html
https://nlnetlabs.nl/projects/unbound/security-advisories/
http://cve.mitre.org/news/archives/2015/news.html#january132015_cve_editors_commentary_page_updated
http://www.pcworld.com/article/2939552/adobe-patches-zeroday-flash-player-flaw-used-in-targeted-attacks.html
https://us.hikvision.com/en/support-resources/cybersecurity-center/security-notices
https://talosintelligence.com/vulnerability_reports
https://technet.microsoft.com/en-us/security/ff852094.aspx
https://www.suse.com/security/cve/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7848
https://www.blackberry.com/us/en/services/blackberry-product-security-incident-response
http://cve.mitre.org/data/board/archives/2018-12/msg00002.html
http://androidheadlines.com/
http://cve.mitre.org/cve/cna/cna_processes.pptx
https://www.bitdefender.com/media/materials/bug_bounty/bitdefender_bug_bounty_terms_and_conditions.pdf
http://cve.mitre.org/data/board/archives/2011-09/threads.html
http://cve.mitre.org/cve/cna/rules.html#section_8-1_cve_entry_information_requirements
http://cve.mitre.org/about/terminology.html#cve_record
http://www.zte.com.cn/global/products
http://cve.mitre.org/data/board/archives/2013-11/maillist.html
https://us.norton.com/support/tools/security-advisories.html
http://cve.mitre.org/news/archives/2017/news.html#august102017_airbus_and_kaspersky_added_as_cve_numbering_authority_cna
http://cve.mitre.org/blog/november162020_our_cve_story_the_gift_of_cve.html
http://cve.mitre.org/data/board/archives/1999-11/msg00010.html
https://hackerone.com/logitech
https://enterprise.github.com/releases
https://www.ibm.com/security/secure-engineering/bulletins.html
http://cve.mitre.org/data/board/archives/2013-02/msg00013.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2885
http://cve.mitre.org/news/archives/2015/news.html#march272015_cve_mentioned_in_article_about_a_vulnerability_in_a_wind_turbine_on_the_register
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-16-october-2019-td1655.html
https://www.juniper.net/us/en/security/report-vulnerability/
http://cve.mitre.org/working_groups.html
http://cve.mitre.org/news/archives/2017/news.html
http://cve.mitre.org/data/board/archives/2011-11/maillist.html
http://www.gadget.co.za/pebble.asp?relid%3D9459
https://support.broadcom.com/security-advisory/security-advisories-list.html
http://cve.mitre.org/news/archives/2015/news.html#july232015_cve_mentioned_in_article_about_chrome_vulnerabilities_on_esecurity_planet
http://www.securityweek.com/misfortune-cookie-vulnerability-exposes-millions-routers
http://cve.mitre.org/about/terminology.html#vulnerability
http://www.websense.com/content/websense-2015-threat-report.aspx?intcmp%3Dhp-promo-en-2015-threat-report
http://cve.mitre.org/data/board/archives/2011-11/msg00000.html
https://www.incibe.es/en/cna-disclosure-policy
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-0751
http://www.theregister.co.uk/2014/09/29/shellshock_patching_bash_cloudpassage/
https://hackerone.com/cloudflare/hacktivity
http://cve.mitre.org/data/board/archives/2016-01/maillist.html
http://cve.mitre.org/data/board/archives/2017-12/msg00032.html
https://www.microsoft.com/en-us/msrc/cvd?rtc%3D1
http://www.theregister.co.uk/2014/11/21/hikvision_dvrs_wide_open_to_hacking_say_security_analysts/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0864
http://www.computerworld.com/article/2877986/flash-player-faces-its-third-zero-day-flaw-in-a-month-updates-coming.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2012-0158
http://bgr.com/2015/10/15/adobe-flash-player-security-vulnerability-warning/
https://support.hp.com/us-en/document/c06144280
http://www.infobytesec.com/
https://www.synaptics.com/vulnerability-disclosure-policy
https://www.blackhat.com/us-13/speakers/steve-christey.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3686
https://support.apple.com/en-us/ht205212
http://mnrdaily.com/article/microsoft.patches.windows.zero.day.security.flaw/1448.htm
http://cve.mitre.org/cve/cna/resources.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3685
http://web.nvd.nist.gov/view/ncp/repository
https://www.google-analytics.com/analytics.js
http://cve.mitre.org/data/board/archives/1999-12/msg00020.html
https://fedoraproject.org/wiki/bugs_and_feature_requests
http://www.csmonitor.com/world/passcode/2015/0522/what-the-security-industry-can-learn-from-the-world-health-organization
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1641
http://cve.mitre.org/news/archives/2017/news.html#march092017_qihoo_360_added_as_cve_numbering_authority_cna
http://cve.mitre.org/blog/
http://cve.mitre.org/cve/cna.html#documentation_for_cnas
http://www.infoworld.com/article/3008837/javascript/nodejs-discloses-two-critical-security-vulnerabilities.html
http://cve.mitre.org/data/board/archives/2001-01/msg00010.html
http://cve.mitre.org/data/board/archives/2004-08/threads.html
http://cve.mitre.org/data/board/archives/2016-05/msg00004.html
http://www.securityweek.com/freak-vulnerability-exposes-ssltls-security-hole
https://airbus-seclab.github.io/
http://www.pcworld.com/article/2142140/twitter-at-least-dodged-the-horrors-of-heartbleed.html
http://www.franchiseherald.com/articles/18506/20141223/apple-mac-os-update.htm
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0469
https://www.tibco.com/security/vulnerability-disclosure-policy
http://cve.mitre.org/news/archives/2014/news.html#october272014_cve_list_surpasses_65000_cve_identifiers
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2005-4900
http://cve.mitre.org/blog/june222020_our_cve_story_bringing_our_zdi_community_to_the_cve_community.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3673
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3679
http://cve.mitre.org/about/faqs.html#why_cve_record_marked_reserved_when_being_publicly_used
https://developer.joomla.org/security.html
https://www.blackhat.com/asia-15/briefings.html#security-content-metadata-model-with-an-efficient-search-methodology-for-real-time-monitoring-and-threat-intelligence
http://www.zdnet.com/article/microsoft-releases-emergency-patch-for-critical-windows-flaw/
https://www.facebook.com/security
https://www.microfocus.com/security
https://www.sans.org/reading-room/whitepapers/analyst/who-039-s-cyberthreat-intelligence-how-35767
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
https://www.fortiguard.com/psirt
http://googleonlinesecurity.blogspot.com/2015/04/android-security-state-of-union-2014.html
http://www.zerodayinitiative.com/
https://community.sophos.com/b/security-blog/
https://help.netflix.com/en/node/6657
http://cve.mitre.org/news/archives/2017/news.html#august022017_minutes_from_cve_board_teleconference_meeting_on_may_24_now_available
http://cve.mitre.org/cve/request_id.html#cna_coverage
http://cve.mitre.org/data/board/archives/2006-09/maillist.html
http://www.eweek.com/security/drupal-users-had-seven-hours-to-patch-or-be-hacked.html
http://www.jpcert.or.jp/english/
http://cve.mitre.org/data/board/archives/2018-01/msg00018.html
http://cve.mitre.org/news/archives/2017/news.html#march162017_focus_on_the_significance_and_meaning_of_a_cve_identifier_marked_as_reserved
https://www.nist.gov/
http://cve.mitre.org/data/board/archives/2016-10/maillist.html
http://secunia.com/vulnerability-review/index.html
http://www.sourceconference.com/boston-2017-main
http://cve.mitre.org/news/archives/2021/news.html
http://cve.mitre.org/data/board/archives/2018-10/msg00013.html
http://cve.mitre.org/news/archives/2014/news.html#september172014_several_organizations_announce_compliance_with_new_cve_id_format_in_advance_of_upcoming_deadline
http://cve.mitre.org/news/archives/2017/news.html#october132017_minutes_from_cve_board_teleconference_meeting_on_october_4_now_available
http://cve.mitre.org/news/archives/2020/calendar.html
http://www.eweek.com/blogs/security-watch/misconfiguration-exposes-hotel-routers-to-risk.html
http://cve.mitre.org/about/terminology.html#root
http://cve.mitre.org/news/archives/2014/news.html
http://www.pcworld.com/article/2861232/vulnerability-in-embedded-web-server-exposes-millions-of-routers-to-hacking.html
https://www.first.org/global/sigs/vulnerability-coordination/multiparty/first-multiparty-vulnerability-coordination-latest.pdf?20180424.pdf
https://xenbits.xen.org/xsa/
http://cve.mitre.org/data/board/archives/2013-05/msg00043.html
http://www.itworld.com/article/2880295/adobe-starts-patching-latest-flash-flaw.html
http://cve.mitre.org/news/archives/2015/news.html#april232015_cve_identifiers_used_throughout_hps_hp_cyber_risk_report_2015
https://ioactive.com/
https://www.whitehouse.gov/omb/
http://cve.mitre.org/data/board/archives/2013-02/maillist.html
http://cve.mitre.org/data/board/archives/2016-06/maillist.html
http://www.mitre.org/news/press-releases/leading-software-vendors-and-cybersecurity-organizations-among-early-adopters-of
http://cve.mitre.org/compatible/requirements.html
http://cve.mitre.org/news/archives/2019/news.html
http://cve.mitre.org/news/archives/2014/news.html#september092014_cve_mentioned_in_article_about_vulnerabilities_in_network_attached_storage_devices_on_pcworld.com
https://www.broadcom.com/support/fibre-channel-networking/security-advisories
https://continuousassurance.org/swamp/swamp-heartbleed-white-paper-22apr2014-current.pdf
https://security.samsungmobile.com/workscope.smsb
http://www.marketwired.com/press-release/twistlock-strengthens-container-security-for-enterprise-computing-2072024.htm
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1835
http://cve.mitre.org/news/archives/2015/news.html#may282015_cve_mentioned_in_article_about_vulnerabilities_in_hospira_drug_pumps_on_sc_magazine
https://global.blackberry.com/en/secure/report-an-issue/en
https://otrs.com/overview-release-notes-security-advisories/security-advisories/
http://www.darkreading.com/vulnerabilities---threats/new-openssl-flaw-exposes-ssl-to-man-in-the-middle-attack/d/d-id/1269452
http://www.ge.com/security
https://www.irs.gov/
http://cve.mitre.org/news/archives/2015/news.html#january082015_cve_mentioned_in_article_about_vulnerabilities_in_software_libraries_on_techworld.com
http://gadgets.ndtv.com/internet/news/adobe-says-fix-for-latest-flash-player-zero-day-vulnerability-due-soon-656802
http://cve.mitre.org/data/board/archives/2018-06/threads.html
https://security.nozominetworks.com/psirt
http://blog.trendmicro.com/trendlabs-security-intelligence/android-mediaserver-bug-traps-phones-in-endless-reboots/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3876
https://www.eaton.com/us/en-us/company/news-insights/cybersecurity/vulnerabilitydisclosure.html%3D20
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-0307
https://www.tenable.com/security/report
https://github.com/cveproject/automation-working-group/tree/master/cve_json_schema
http://arstechnica.com/security/2014/06/still-reeling-from-heartbleed-openssl-suffers-from-crypto-bypass-flaw/
http://cve.mitre.org/cvename.cgi?name%3Dcve-2015-7078
https://cveproject.github.io/docs/cna/resources/submitting%20new%20cves%20using%20sourcetree.docx
https://www.marklogic.com/bulletins/
http://cve.mitre.org/data/board/archives/2000-08/maillist.html
http://cve.mitre.org/about/documents.html#cna
https://search-guard.com/disclosure-policy
http://cve.mitre.org/data/board/archives/1999-12/threads.html
http://cve.mitre.org/data/board/archives/2000-03/threads.html
http://cve.mitre.org/data/board/archives/2003-07/maillist.html
http://cve.mitre.org/news/archives/2015/news.html#april232015_cve_identifier_%e2%80%9ccve_2015_3043%e2%80%9d_mentioned_in_article_about_an_adobe_zero_day_vulnerability_on_cso
http://www.itworld.com/article/2876098/linux-hit-by-critical-security-hole.html
http://www.darkreading.com/browser-vulnerability-privacy-disaster-for-3-of-4-android-users-/d/d-id/1315792
https://www.nvidia.com/en-us/security/report-vulnerability/
http://cve.mitre.org/data/board/archives/1999-08/threads.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0204
http://cve.mitre.org/data/board/archives/2018-10/maillist.html
https://www.qnap.com/en-us/
http://www.theregister.co.uk/2014/09/25/shellshock_bash_worm_type_fears/
http://vapidlabs.com
http://hextechsecurity.com/?p%3D123
http://www.theregister.co.uk/2015/06/23/adobe_flash_player/
http://cve.mitre.org/community/board/cve_board_nomination_form.docx
http://www.eweek.com/security/adobe-microsoft-and-oracle-patch-for-hacking-team-flaws.html
https://success.trendmicro.com/vulnerability-response
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3696
http://www.zdnet.com/shellshock-better-bash-patches-now-available-7000034115/
https://sick.com/psirt
https://psirt.bosch.com/bosch-responsible-disclosure-policy/
https://nvd.nist.gov/
http://cve.mitre.org/news/archives/2002/calendar.html
https://bitbucket.org/atlassian
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1651
http://www.theregister.co.uk/2015/10/06/cisco_reforms_its_security_disclosure_process/
http://cve.mitre.org/cve/cna/rules.html#section_8-3_cve_entry_reference_requirements
http://cve.mitre.org/podcast/episode_1_how_cve_cisa_and_nist_work_together_to_manage_vulnerabilities.mp3
https://helpx.adobe.com/security.html
http://www.androidheadlines.com/samsung-galaxy-note-4
http://cve.mitre.org/news/archives/2017/news.html#may222017_bluedon_information_security_technologies_makes_declaration_of_cve_compatibility
https://obdev.at/cve/vulnerability-disclosure-policy.html
http://neurogadget.com/2015/10/26/adobe-flash-player-19-0-0-226-patched-a-vulnerability-is-it-still-worth-it/18430
http://cve.mitre.org/data/downloads/allitems.txt
http://www.security-next.com/53106
http://www.techtimes.com/articles/63254/20150624/adobe-releases-patch-to-plug-flash-players-zero-day-vulnerability.htm
http://gcn.com/
http://www.valuewalk.com/2014/12/apple-just-gave-security-update-didnt-ask-first/
http://dfw.cbslocal.com/2014/04/08/internet-heartbleed-bug-exposing-passwords-to-hackers/
http://cve.mitre.org/data/board/archives/2017-07/msg00067.html
https://search-guard.com/cve-advisory
http://cve.mitre.org/about/getting_started.html
https://new.siemens.com/global/en/products/services/cert.html#securitypublications
https://wpscan.com/wordpresses
http://cve.mitre.org/news/archives/2015/news.html#november122015_after_16+_years_cve_co_founder_steve_christey_coley_departs_the_cve_project
https://bodhi.fedoraproject.org/updates/?type%3Dsecurity
http://www.cso.com.au/article/572705/adobe-patches-vulnerabilities-coldfusion-flex-flash-player-including-zero-day-flaw/
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/revised-cve-board-agenda-for-wednesday-5-february-2020-td1703.html
http://www.computerweekly.com/news/4500250271/microsoft-issues-emergency-fix-for-windows-flaw
http://www.computerworld.com/article/2947760/security/oracle-fixes-zeroday-java-flaw-and-over-190-other-vulnerabilities.html
http://cve.mitre.org/about/faqs.html#cve_entry_descriptions_created
http://www.computerweekly.com/news/2240222088/heartbleed-leads-to-discover-of-more-openssl-flaws
http://techreport.com/news/28479/updated-preinstalled-swiftkey-app-can-own-some-samsung-phones
https://www.xylem.com/en-us/about-xylem/cybersecurity/
http://www.darkreading.com/vulnerabilities---threats/stagefright-android-bug-heartbleed-for-mobile-but-harder-to-patch/d/d-id/1321477
https://cybersecurityworks.com/vulnerability-disclosure-policy.php
http://www.eweek.com/security/apples-ios-9-addresses-long-list-of-vulnerabilities.html
http://cve.mitre.org/news/archives/2021/news.html#february232021_minutes_from_cve_board_teleconference_meeting_on_february_17_now_available
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2008.xml
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-6february2019-td1518.html
https://www.fbi.gov/
http://www.dahuasecurity.com/en/us/cybersecurity.php
http://cve.mitre.org/cve/identifiers/cve-syntax-test-data.zip
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-3566
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/correction-cve-board-meeting-summary-11-december-2019-td1677.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3823
http://cve.mitre.org/about/documents.html#presentations_more
http://cve.mitre.org/cvename.cgi?name%3Dcve-2015-7094
https://www.dahuasecurity.com/support/cybersecurity/annoucementnotice
http://cve.mitre.org/news/archives/2014/news.html#december182014_cve_mentioned_in_article_about_microsoft%e2%80%99s_patch_tuesday_for_december_on_eweek
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5367
http://cve.mitre.org/data/board/archives/2018-03/threads.html
http://cve.mitre.org/about/index.html
http://www.slashgear.com/adobe-flash-has-a-new-critical-vulnerability-on-all-platforms-15409916/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-0322
http://www.infosecurity-magazine.com/news/flash-zeroday-dailymotioncom-for/
http://cve.mitre.org/compatible/questionnaires/160.html
http://grahamcluley.com/2015/02/google-vulnerability-disclosure/
http://cve.mitre.org/data/board/archives/2003-03/threads.html
http://www.cnet.com/news/apples-shellshock-patch-incomplete-say-experts/
http://hitech.vesti.ru/news/view/id/7362
https://bugcrowd.com/atlassian
http://cve.mitre.org/data/refs/
http://cve.mitre.org/data/board/archives/2016-06/msg00001.html
http://www.eweek.com/security/surveillance-tech-firm-hacking-team-falls-victim-to-hackers.html
http://www.scmagazine.com/microsoft-addresses-26-vulnerabilities-some-critical-on-patch-tuesday/article/409048/
http://cve.mitre.org/find/search_tips.html#other_search_resources
http://cve.mitre.org/data/downloads/allitems-cvrf-year-2016.xml
http://cve.mitre.org/news/archives/2021/news.html#march222021_environmental_systems_research_institute_added_as_cve_numbering_authority_cna
http://arstechnica.com/security/2015/02/as-flash-0day-exploits-reach-new-level-of-meanness-what-are-users-to-do/
http://cve.mitre.org/data/board/archives/2014-04/threads.html
http://www.techspot.com/news/61530-new-android-vulnerability-targets-messaging-platform-nearly-billion.html
http://www.eweek.com/c/a/security/stuxnet-worm-nine-facts-every-it-security-pro-should-know-562912
http://cve.mitre.org/data/board/archives/2018-05/maillist.html
http://cve.mitre.org/data/board/archives/2017-11/threads.html
http://cve.mitre.org/about/history.html
http://www.emirates247.com/business/technology/hackers-target-mac-machines-apple-hits-back-2014-12-24-1.574393
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-3april-2019-td1550.html
http://cve.mitre.org/data/board/archives/2014-01/maillist.html
http://cve.mitre.org/news/archives/2001/calendar.html
http://maecproject.github.io/
http://www.scmagazine.com/seven-vulnerabilities-addressed-in-openssl-update-one-enables-mitm-attack/article/351323/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3829
http://cve.mitre.org/cve/cna/requesting_blocks_of_cve_ids-for_cnas_only.pdf
http://www.darkreading.com/vulnerabilities---threats/hacking-team-detection-tools-released-by-rook-facebook/d/d-id/1321402
http://www.darkreading.com/vulnerabilities---threats/stagefright-20-vuln-affects-nearly-all-android-devices-/d/d-id/1322446
http://cve.mitre.org/news/archives/2015/news.html#january082015_cve_identifier_cve_2014_9222_cited_in_numerous_security_advisories_and_news_media_references_about_misfortune_cookie_vulnerability
https://www.qualcomm.com/
https://www.huawei.com/psirt
http://www.icasi.org/cvrf
http://cve.mitre.org/news/archives/2017/news.html#august092017_autodesk_added_as_cve_numbering_authority_cna
http://www.techworld.com/news/security/dangerous-misfortune-cookie-flaw-discovered-in-12-million-home-routers-3591547/
http://securityaffairs.co/wordpress/29607/security/zero-day-samsung-findmymobile.html
https://www.autodesk.com/
http://cve.mitre.org/data/board/archives/2018-12/msg00000.html
http://ht4u.net/news/30183_schwachstelle_im_dienst_find_my_mobile_kann_samsung-geraete_sperren/
http://cve.mitre.org/data/board/archives/2016-09/threads.html
http://cve.mitre.org/news/archives/2017/news.html#september292017_cve_replaces_cve_compatibility_program_with_cve_compatibility_guidance_document
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7645
http://cvedev1.mitre.org/cve/identifiers/tech-guidance.html#test_data
http://cve.mitre.org/news/archives/2015/news.html#april102015_cve_identifiers_used_throughout_googles_android_security_2014_year_in_review_report
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2010-2568/
https://security.opera.com/report-security-issue/
http://cve.mitre.org/cve.mitre.org/cve/cna.html#cna_types
http://cve.mitre.org/news/archives/2021/news.html#march1522021_xen_project_added_as_cve_numbering_authority_cna
https://usn.ubuntu.com/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3688
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0835
http://cve.mitre.org/cve/request_id.html#program_root_cna_pgp_key
https://access.redhat.com/security/cve/cve-2014-0160
https://support.hp.com/us-en/security-bulletins
https://cveproject.github.io/docs/cna/resources/submitting%20new%20cves%20using%20cli.docx
http://www.marketwatch.com/story/media-alert-check-point-researchers-discover-significant-vulnerability-that-could-be-used-to-take-control-of-millions-of-consumer-and-business-internet-routers-2014-12-18
http://www.dell.com/learn/us/en/04/campaigns/heartbleed-remediation
http://cve.mitre.org/news/archives/2021/news.html#march0822021_arista_added_as_cve_numbering_authority_cna
http://www.pcworld.com/article/2462600/networkattached-storage-devices-more-vulnerable-than-routers-researcher-finds.html
http://cve.mitre.org/data/board/archives/2005-12/maillist.html
http://www.percona.com/blog/2014/09/26/bash-bug-giving-you-shellshock-cve-2014-6271-update/
https://www.whitesourcesoftware.com/vulnerability-database/disclosure-policy
http://cve.mitre.org/news/archives/2014/news.html#mar172014_codenomicon_makes_declaration_of_cve_compatibility
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3825
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3842
http://threatpost.com/cve-identifiers-make-room-for-a-few-more-digits/108390
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7073
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-1-april-2020-td1754.html
http://cve.mitre.org/news/archives/2017/news.html#february022017_minutes_from_cve_board_teleconference_meeting_on_january_11_now_available
http://cve.mitre.org/data/board/archives/2017-08/msg00016.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2425
http://www.oracle.com/
http://cve.mitre.org/compatible/guidelines.html
https://continuousassurance.org/blog/2014/04/09/openssl-heartbleed-cve-2014-0160/
https://www.ultimateears.com/
http://cve.mitre.org/data/refs/index.html
http://indianexpress.com/article/technology/mobile-tabs/samsung-devices-have-keyboard-security-risk-over-600-mn-devices-affected-report/
http://cve.mitre.org/news/archives/2017/news.html#december262017_minutes_from_cve_board_teleconference_meeting_on_december_13_now_available
http://cve.mitre.org/data/downloads/allitems.txt.gz
https://github.com/cveproject/automation-working-group/blob/master/awg_charter.md
http://cve.mitre.org/blog/february112020_cve_program_report_for_calendar_year_q4-2019.html
http://cve.mitre.org/data/board/archives/2017-12/msg00001.html
http://www.esecurityplanet.com/wireless-security/new-security-flaw-found-in-hotel-wi-fi-systems.html
http://www.esecurityplanet.com/browser-security/google-chrome-44-updates-for-43-vulnerabilities.html
http://www.eweek.com/security/freak-attacks-ssltls-security-putting-apple-android-users-at-risk.html
http://www.v3.co.uk/v3-uk/news/2414637/adobe-releases-emergency-zero-day-flaw-fix-to-combat-apt3-clandestine-wolf-hackers
http://www.theinquirer.net/inquirer/news/2414694/adobe-issues-emergency-patch-for-flash-player-zero-day-flaw
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-10001
https://www.tenable.com/security/report/
http://www.linuxinsider.com/story/82570.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-4880
http://cve.mitre.org/news/archives/2017/news.html#january122017_cve_updates_its_definition_of_vulnerability
https://youtu.be/5l4cxdw8lhc
https://new.siemens.com/global/en/products/services/cert/vulnerability-process.html
https://www.hillstonenet.com.cn/product-and-service/security-sevice/security-incident-response/
http://cve.mitre.org/blog/january262021_cve_program_report_for_q4_calendar_year_2020.html
https://www.youtube.com/playlist?list%3Dplwfd9rqvdj6c4emkdqbokqf7zpcqxkgx3
http://cve.mitre.org/news/archives/2015/news.html#march032015_cve_mentioned_in_article_about_a_samba_vulnerability_on_the_register
http://cve.mitre.org/news/archives/2005/news.html
https://www.qnap.com/en-us/security-advisory/report
http://googleprojectzero.blogspot.com/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0005/>%3B
http://cve.mitre.org/compatible/process.html
http://cve.mitre.org/blog/december112020_cve_program_terminology_updated-cve_record_top-level_root_and_more.html
http://cve.mitre.org/data/board/archives/2015-10/maillist.html
http://www.csoonline.com/article/2841456/application-security/what-you-need-to-know-about-the-drupal-vulnerability-cve-2014-3704.html
http://cve.mitre.org/blog/september222020_our_cve_story_ancient_history_of_the_cve_program_-_did_the_microsoft_security_response_center_have_precognition.html
http://cve.mitre.org/cwss/
http://cve.mitre.org/data/board/archives/2013-01/threads.html
http://cve.mitre.org/images/incibe_cna_contact_email_address_image.png
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-14-oct-2020-tt1907.html
https://nvd.nist.gov/home.cfm
http://www.computerworld.com/article/2899482/openssl-fixes-serious-denial-of-service-bug-11-other-flaws.html
http://cve.mitre.org/news/archives/2017/news.html#april142017_expanding_and_improving_cve_talk_at_source_boston_2017_on_april_27
https://www.us-cert.gov/
https://kb.isc.org/article/aa-01272/74/cve-2015-5477:-an-error-in-handling-tkey-queries-can-cause-named-to-exit-with-a-require-assertion-failure.html
http://www.techtimes.com/articles/18911/20141029/samsung-find-my-mobile-service-exploit-allows-hackers-to-remotely-lock-your-smartphone.htm
http://cve.mitre.org/news/archives/2014/news.html#may012014_cve_and_cwe_cited_in_white_paper_about_the_heartbleed_vulnerability
http://cve.mitre.org/data/board/archives/2000-05/maillist.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-0291
https://wiki.scn.sap.com/wiki/display/psr/the+official+sap+product+security+response+space
https://www.bluedesigns.com/
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-3234
http://cve.mitre.org/community/board/charter.html
http://cve.mitre.org/news/images/stevechristey_pl.png
http://cve.mitre.org/news/archives/2015/news.html#july282015_hillstone_networks_makes_declaration_of_cve_compatibility
http://cve.mitre.org/news/archives/2004/calendar.html
http://thehackernews.com/2015/03/hacking-hotel-wifi-network.html
http://cve.mitre.org/about/faqs.html#web_form_cveid_rejected
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5858
http://cve.mitre.org/cve/search_cve_list.html
http://www.darkreading.com/new-adobe-flash-0-day-used-in-malvertising-campaign/d/d-id/1318900
http://cve.mitre.org/news/archives/2017/news.html#october052017_asustor_added_as_cve_numbering_authority_cna
https://www.trendmicro.com/
http://cve.mitre.org/data/board/archives/2016-01/threads.html
https://cloudfoundry.org/security
https://www.vmware.com/support/policies/security_response.html
http://cve.mitre.org/about/faqs.html#date_record_created_in_cve_record
http://www.newsfactor.com/accuserve/accuserve-go.php?c%3D16658
http://www.digi.no/sikkerhet/2015/07/21/kritisk-hull-i-alle-windows-versjoner
http://cve.mitre.org/data/board/archives/2000-03/maillist.html
http://cve.mitre.org/data/board/archives/2002-01/maillist.html
http://www.computerworld.com/article/2892926/time-to-freak-out-how-to-tell-if-youre-vulnerable.html
http://cve.mitre.org/news/archives/2011/calendar.html
http://www.v3.co.uk/v3-uk/news/2348696/openssl-man-in-the-middle-flaw-found-after-16-years
http://www.owasp.org/index.php/owasp_top_ten_project
http://www.scmagazine.com/adobe-issues-advisory-for-flash-vulnerability-targeting-government-agencies/article/445181/
http://www.cnet.com/news/apple-updates-macs-without-asking-but-its-to-foil-hackers/
http://cve.mitre.org/blog/july312020_process_for_assigning_cve_ids_to_end_of_life_eol_products.html
http://cve.mitre.org/data/board/archives/2018-04/threads.html
http://cve.mitre.org/compatible/questionnaires/163.html
https://www.vivo.com/en/activity/security-advisory
http://cve.mitre.org/news/archives/2015/news.html#july72015_25_cve_ids_cited_in_article_about_fixes_to_apple_os_x_and_ios_vulnerabilities_on_eweek
http://cve.mitre.org/news/archives/2014/news.html#september252014_numerous_news_media_articles_posted_about_upcoming_cve_id_syntax_compliance_deadline
http://cve.mitre.org/data/board/archives/2017-03/msg00032.html
https://www.toolswatch.org/
http://www.itpro.co.uk/security/24853/latest-adobe-flash-vulnerability-appears-in-exploit-kits
http://cve.mitre.org/news/archives/2001/news.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1635
http://www.egc-group.org/index.html
http://www.scmagazine.com/sensys-networks-releases-updates-to-address-vehicle-traffic-sensor-vulnerabilities/article/370595/
https://www.nsa.gov/
https://www.hillstonenet.com.cn/product-and-service/security-sevice/security-bulletins-and-advisories/
http://cve.mitre.org/data/board/archives/2017-11/msg00044.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-7187
http://cve.mitre.org/cve/request_id.html#cna_participants
http://security.360.cn/
http://cve.mitre.org/cve/cna/rules.html#section_7-1_what_is_a_vulnerability
http://www.scmagazine.com/critical-remote-code-execution-vulnerabilities-in-stagefright-exploitable-on-95-percent-of-android-devices/article/428786/
https://www.trustwave.com/
http://www.cso.com.au/article/564898/remotely-exploitable-ghost-bug-strikes-all-linux-distros/
http://cve.mitre.org/data/board/archives/2016-04/threads.html
http://cve.mitre.org/news/archives/2014/news.html#december182014_cve_mentioned_in_article_about_branding_vulnerabilities_with_catchy_names_and_logos_on_zdnet
https://www.nvidia.com/en-us/security/
http://cve.mitre.org/data/board/archives/2014-09/threads.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7077
https://helpx.adobe.com/security/alertus.html
http://blogs.cisco.com/security/psirt-u
https://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-1835
http://cve.mitre.org/css/main.css
http://cve.mitre.org/data/board/archives/2017-09/msg00028.html
http://www.computerworld.com/article/2834650/drupal-releases-patch-for-serious-sql-injection-flaw.html
http://cve.mitre.org/about/faqs.html#cve_record_references
http://cve.mitre.org/data/board/archives/2017-04/msg00021.html
https://github.com/line
http://www.infosecisland.com/blogview/24055-nist-warns-on-zero-day-flaw-in-samsung-findmymobile.html
http://cve.mitre.org/compatible/questionnaires/164.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2888
http://cve.mitre.org/news/archives/2000/calendar.html
https://developer.joomla.org/security-centre.html
https://cveproject.github.io/docs/content/key-details-phrasing.pdf
http://cve.mitre.org/cve/cna/rules.html#section_7_assignment_rules
http://cve.mitre.org/about/faqs.html#reject_signify_in_cve_id
http://cve.mitre.org/data/board/archives/2017-02/threads.html
http://www.zdnet.com/the-branded-bug-meet-the-people-who-name-vulnerabilities-7000036140/
http://cve.mitre.org/data/board/archives/2002-05/threads.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2010-2568
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-6175
http://www.itespresso.fr/securite-it-ghost-plane-linux-86944.html
http://www.securityweek.com/dangerous-same-origin-policy-bypass-flaw-found-android-browser
http://www.thanhniennews.com/youth-science/the-branding-of-a-bug-how-heartbleed-became-a-household-name-25800.html
http://news.softpedia.com/news/over-600-million-samsung-devices-vulnerable-to-keyboard-security-risk-484562.shtml
http://cve.mitre.org/working_groups.html#ocwg
https://www.zabbix.com/zabbix_security_policy
http://cve.mitre.org/blog/april062018_cna_processes_documentation_now_on_github.html
http://cve.mitre.org/images/cna_world_map/cna_world_map_march_2021.png
http://www.itproportal.com/2015/03/05/freak-flaw-intercepts-decrypts-ssl-traffic/
https://downloads.avaya.com/css/p8/documents/100045520
http://cve.mitre.org/about/faqs.html#disputed_signify_in_cve_record
https://www.jpcert.or.jp/vh/index.html
https://us-cert.cisa.gov/ics/alerts
http://cve.mitre.org/data/board/archives/2018-05/msg00010.html
http://cve.mitre.org/data/board/archives/2017-09/threads.html
https://www.disa.mil/
http://www.techworld.com/news/apps/think-that-software-library-is-safe-to-use-not-so-fast-3592290/
https://www.samba.org/samba/security/cve-2015-0240
https://cse.google.com/cse.js?cx%3D
http://cve.mitre.org/data/board/archives/2015-10/msg00022.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2014-6352
http://cve.mitre.org/cve/cna/cve_entry_submission_process_ja.pptx
http://www.itworldcanada.com/post/venom-bug-bites-several-virtualization-platforms-patching-needed
http://cve.mitre.org/data/board/archives/2001-10/threads.html
https://jvn.jp/
http://www.bluedon.com/
http://www.dailymail.co.uk/sciencetech/article-3080708/venom-bug-allow-hackers-cloud-servers-experts-say-worse-heartbleed.html
http://www.darkreading.com/vulnerabilities---threats/experts-opinions-mixed-on-venom-vulnerability/d/d-id/1320425
http://sec.chinabyte.com/319/13071819.shtml
http://cve.mitre.org/data/board/archives/2000-11/threads.html
http://www.open-scap.org/page/documentation#how_to_run_vulnerability_scan_on_red_hat_enterprise_linux
http://cve.mitre.org/cve/cna/assigning_cve_ids_ja.pptx
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2010-0188
http://www.scmagazine.com/watering-hole-attack-targets-website-visitors-of-oil-and-gas-start-up/article/372415/
http://cve.mitre.org/cve/identifiers/tech-guidance.html#extraction_or_parsing
https://www.rapid7.com/security/disclosure/
https://lp3.com/
http://cve.mitre.org/cve/cna/cve_program_overview_ja.pptx
https://www.siemens.com/cert
http://cve.mitre.org/news/archives/2015/news.html#july232015_cve_mentioned_in_article_about_oracle
http://www.symantec.com/
http://techday.com/it-brief/news/are-vulnerabilities-really-a-risk-or-simply-hype/190645/
https://www.youtube.com/embed/miov_x18dve
http://cve.mitre.org/data/board/archives/1999-06/threads.html
http://cve.mitre.org/data/board/archives/2015-06/maillist.html
http://cve.mitre.org/news/archives/2021/news.html#january112021_samsung_mobile_added_as_cve_numbering_authority_cna
http://cve.mitre.org/data/downloads/allitems.xml
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-7068
http://cve.mitre.org/data/board/archives/2012-11/msg00012.html
http://www.eweek.com/security/mitre-warns-of-issues-with-software-flaw-id-system-if-count-top-10k.html
https://www.johnsoncontrols.com/buildings/specialty-pages/product-security/security-advisories
http://common-vulnerabilities-and-exposures-cve-editorial-board.1128451.n5.nabble.com/a-special-quot-thank-you-quot-to-steve-christey-coley-td11.html
http://www.v3.co.uk/v3-uk/news/2410427/apache-cordova-flaw-leaves-one-in-20-android-apps-open-to-attack
http://cve.mitre.org/data/board/archives/2016-12/msg00024.html
https://platform.twitter.com/css/timeline.32f7f89e2e680ebfe3f4cfefb27966ae.light.ltr.css
https://www.linkedin.com/showcase/cve-cwe-capec
http://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/
http://it.tmcnet.com/news/2014/09/22/8028722.htm
http://hothardware.com/news/adobe-flex-vulnerability-that-was-patched-in-2011-still-threatens-websites
http://www.tripwire.com/state-of-security/top-security-stories/major-remote-exploitable-vulnerability-found-in-bash-affecting-linux-cve-2014-6271/
http://thehackernews.com/2014/12/router-vulnerability-puts-12-million.html
http://cve.mitre.org/blog/december152016_whats_your_opinion_on_updating_cve_id_descriptions.html
http://cve.mitre.org/cve/identifiers/syntaxchange.html#new
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-8027
http://cve.mitre.org/data/board/archives/2017-10/msg00062.html
http://www.dhs.gov/
https://threatpost.com/adobe-cve-2011-2461-remains-exploitable-four-years-after-patch/111754
https://www.intelligence.gov/
http://www.networkworld.com/article/2902892/security0/flaw-in-common-hotel-router-threatens-guests-devices.html
https://www.atlassian.com/trust/security/advisory-publishing-policy
http://www.scmagazine.com/oracle-patches-buffer-overflow-bug-venom/article/415329/
https://labs.f-secure.com/vulnerability-disclosure-policy/
http://www.theregister.co.uk/
http://www.technewsworld.com/story/81678.html
https://www.tcpdump.org/public-cve-list.txt
http://www.zdnet.com/article/critical-linux-security-hole-found/
http://www.eweek.com/security/cisco-exposes-helps-patch-multiple-ntp-vulnerabilities.html
http://cve.mitre.org/about/documents.html#cna_cve_id_assignment
http://cve.mitre.org/data/board/archives/2016-03/maillist.html
http://www.cso.com.au/article/562848/check-point-researchers-discover-significant-vulnerability-could-used-take-control-millions-consumer-business-internet-routers/
http://www.computerworld.com/article/2949589/malware-vulnerabilities/microsoft-patches-windows-zero-day-found-in-hacking-teams-leaked-docs.html
https://www.vmware.com/security/advisories.html
http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-5123
http://cve.mitre.org/news/archives/2015/news.html#october12015_1_product_from_hillstone_networks_now_registered_as_officially_cve_compatible
http://cve.mitre.org/data/board/archives/2004-08/maillist.html
https://www.odoo.com/security-advisories
https://www.google.com/
http://cve.mitre.org/news/archives/2017/news.html#january192017_tibco_software_added_as_cve_numbering_authority_cna
https://www.paloaltonetworks.com/security-disclosure
https://xenproject.org/developers/teams/
http://www.scmagazine.com/
http://cve.mitre.org/news/archives/2017/calendar.html
http://cve.mitre.org/data/board/archives/2007-01/threads.html
http://cve.mitre.org/data/board/archives/2015-11/threads.html
https://www.ibm.com/security/secure-engineering/report.html
http://www.itjungle.com/tfh/tfh041414-story02.html
https://cybellum.com/vulnerabilities/
http://cve.mitre.org/news/archives/2015/news.html#april162015_interition_makes_declaration_of_cve_compatibility
https://www.cisecurity.org/
https://snyk.io/docs/security/#open-source-packages-disclosure-policy
http://common-vulnerabilities-and-exposures-cve-board.1128451.n5.nabble.com/cve-board-meeting-summary-24july2019-td1629.html
http://cve.mitre.org/about/faqs.html#cve_nvd_relationship
http://cve.mitre.org/data/board/archives/2017-12/maillist.html
http://www.elgrupoinformatico.com/millones-moviles-samsung-peligro-por-una-vulnerabilidad-swiftkey-t23773.html
https://technet.microsoft.com/en-us/library/security/ms15-065.aspx
http://cve.mitre.org/news/archives/index.html
http://cve.mitre.org/cve/update_cve_records.html
https://docs.craftercms.org/en/3.2/security/advisory.html
http://www.itu.int/rec/t-rec-x.1520/en
http://cve.mitre.org/data/board/archives/2013-01/msg00011.html
http://googleonlinesecurity.blogspot.com/2014/04/google-services-updated-to-address.html
http://cve.mitre.org/news/archives/2015/news.html#april102015_cve_mentioned_in_article_about_microsofts_march_2015_patch_tuesday_on_networkworld
http://xenbits.xen.org/xsa/advisory-148.html
http://www.eweek.com/security/new-openssl-flaws-arent-a-heartbleed-repeat.html
https://docs.craftercms.org/en/3.2/security/security-policies.html
http://cve.mitre.org/data/board/archives/2017-09/msg00056.html
https://platform.twitter.com/js/timeline.833df28a06200af8a50c4a11bfc52849.js
https://github.com/cveproject/automation-working-group/blob/master/cawg_charter_draft.md
https://www.qualcomm.com/company/product-security/bulletins
http://cve.mitre.org/cgi-bin/cvename.cgi?name%3Dcve-2015-2735