Vulnerabilities Checklists Product Dictionary Impact Metrics Data Feeds Statistics
Home ISAP/SCAP SCAP Validated Tools SCAP Events About Contact Vendor Comments
Mission and Overview
NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA).
Resource Status

NVD contains:

33023 CVE Vulnerabilities
130Checklists
151 US-CERT Alerts
2270 US-CERT Vuln Notes
2097OVAL Queries

Last updated:  10/07/08

CVE Publication rate:

15 vulnerabilities / day
Email List

NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists

Workload Index
Vulnerability Workload Index: 9.46
About Us

NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the Security Content Automation Protocol (SCAP).

National Checklist Program

Download Page for NIST SP 800-70

NIST welcomes and greatly appreciates comments from readers. For SP 800-70, NIST is especially interested in readers' comments about the following (comments can be sent to checklists@nist.gov:
  1. Are the operational environments plus the custom environments sufficiently broad to cover the vast majority of your operational environments? Are the threat statements and general policies sufficiently described? Is there any criterion you would add or remove?
  2. For potential developers of checklists, is the development criteria, i.e., NIST publications and other checklists, sufficient for building checklists that contain consistent levels of security? Is the criteria too broad and general, or is it too specific so as to potentially exclude certain types of products, or did NIST get it right? NIST has tried to strike a balance between criteria that is too restrictive versus criteria that is overly broad.
  3. Especially for vendors, is the description of the checklist program participation requirements straightforward and easy to understand? Are there special concerns that NIST has failed to address? Do you wish to participate in the program? Would you use the checklist program logo?
  4. For potential users, does the document adequately explain how to use checklists? Are the checklist description fields useful? Are there additional checklist description fields you would add?
  5. Are there subjects or issues that NIST did not address but you think should be included in this publication?
Download Packages
Update History
If you would like to be notified of updates to Special Publication 800-70, send an e-mail message to checklists@nist.gov requesting to be on the notification list.

Disclaimer Notice & Privacy Statement / Security Notice

Send comments or suggestions to nvd@nist.gov

NIST Computer Security Resource Center (CSRC)

NIST is an Agency of the U.S. Commerce Department

Full vulnerability listing