CVE Program

Account maintained by the CVE™ Program to update the community on CVE-related announcements. cve.org

CVE ProgramCVE_Program
2026-02-11

NOTICE—
Date/time field normalization maintenance of historical CVE Records to occur February 16–25, 2026.

Date/time fields in CVE Records are, and will remain, strings, not numerical timestamps.

Learn more and view the schedule here: medium.com/@cve_program/notice

Monday, February 16 – CVE Records published from 1999–2007
Tuesday, February 17 – CVE Records published from 2008–2012
Wednesday, February 18 – CVE Records published from 2013–2015
Thursday, February 19 – CVE Records published from 2016–2017
Friday, February 20 – CVE Records published from 2018–2019 (Part 1)
Monday, February 23 – CVE Records published from 2019 (Part 2)–2020
Tuesday, February 24 – CVE Records published from 2021–2022 (Part 1)
Wednesday, February 25 – CVE Records published from 2022 (Part 2)–2026
CVE ProgramCVE_Program
2026-02-10

Project Black is now a CVE Numbering Authority (CNA) assigning CVE IDs for discovered by Project Black that are not within another CNA’s scope

cve.org/News/item/news/2026/02

New CVE Program Partner
CVE ProgramCVE_Program
2026-02-10

Registration is open for “CVE/FIRST VulnCon 2026” on April 13–16, 2026!!!

In-person & virtual available: first.org/conference/vulncon26

The CVE Program and FIRST will co-host “VulnCon 2026” at the DoubleTree Resort by Hilton Hotel Paradise Valley - Scottsdale, in Scottsdale, Arizona, USA, on April 13–16, 2026. Registration, both virtual and in-person, is open on the FIRST website.
CVE ProgramCVE_Program
2026-02-09

837 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of January 26, 2026

cisa.gov/news-events/bulletins

CVE ProgramCVE_Program
2026-02-04

REMINDER —
Beginning this month in mid-February 2026, timestamp strings across historical CVE Records will be normalized. The new format is:

yyyy-MM-ddTHH:mm:ss.sssZ (ISO-8601, UTC)

For example, 2025-07-11T19:32:03.983Z

Learn more: cve.org/Media/News/item/blog/2

CVE ProgramCVE_Program
2026-02-03

“CNA Enrichment Recognition” - 256 CNAs on the list for February 2, 2026

Published monthly, this list recognizes those CVE Numbering Authorities () actively providing and vulnerability data in their Records

medium.com/@cve_program/vulner

Increasing the Value of the CVE Record - CNA Enrichment Recognition List
CVE ProgramCVE_Program
2026-02-03

CODRA is now a CVE Numbering Authority (CNA) assigning CVE IDs for CODRA’s products and related services

cve.org/Media/News/item/news/2

New CVE Program Partner
CVE ProgramCVE_Program
2026-02-03

A BIG WELCOME to these CVE Numbering Authority () partners that joined the Program in January!!!

ByteDance
Hackrate
NIBE
Nintendo
TCL
Vantive

Join: cve.org/PartnerInformation/Par

CVE ProgramCVE_Program
2026-01-29

1,268 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of January 19, 2026

cisa.gov/news-events/bulletins

CVE ProgramCVE_Program
2026-01-27

TCL is now a CVE Numbering Authority (CNA) assigning CVE IDs for TCL smart TV, smart pad, and mobile phone devices only & projects listed on github.com/TclSecLab/CNA/blob/

cve.org/Media/News/item/news/2

New CVE Program Partner
CVE ProgramCVE_Program
2026-01-27

1,135 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of January 12, 2026

cisa.gov/news-events/bulletins

CVE ProgramCVE_Program
2026-01-20

REMINDER—
Beginning in mid-February 2026, timestamp strings across historical CVE Records will be normalized. The new format is:

yyyy-MM-ddTHH:mm:ss.sssZ (ISO-8601, UTC)

For example, 2025-07-11T19:32:03.983Z

Learn more:
medium.com/@cve_program/cve-pr

CVE ProgramCVE_Program
2026-01-13

Nintendo is now a CVE Numbering Authority (CNA) assigning CVE IDs for system vulnerabilities in Nintendo Switch 2/Nintendo Switch/Nintendo Switch Lite + vulnerabilities in Nintendo Switch 2/Nintendo Switch applications for which Nintendo is the publisher worldwide

cve.org/Media/News/item/news/2

New CVE Program Partner
CVE ProgramCVE_Program
2026-01-13

ByteDance is now a CVE Numbering Authority (CNA) assigning CVE IDs for ByteDance issues only

cve.org/Media/News/item/news/2

New CVE Program Partner
CVE ProgramCVE_Program
2026-01-13

Vantive is now a CVE Numbering Authority (CNA) assigning CVE IDs for Vantive’s commercially available products only

cve.org/Media/News/item/news/2

New CVE Program Partner
CVE ProgramCVE_Program
2026-01-13

NIBE is now a CVE Numbering Authority (CNA) assigning CVE IDs for products, services, & solutions developed or sold by NIBE or any of its subsidiaries; open-source projects owned by NIBE or any of its subsidiaries; vulnerabilities in 3rd-party products used by NIBE or any of its subsidiaries that are outside the scope of another CNA; and subsidiaries of NIBE listed on nibe.com

cve.org/Media/News/item/news/2

New CVE Program Partner
CVE ProgramCVE_Program
2026-01-13

Hackrate is now a CVE Numbering Authority (CNA) assigning CVE IDs for vulnerabilities that are discovered, validated, and coordinated through the Hackrate Ethical Hacking Platform, including: software, web applications, APIs, and cloud services; vulnerabilities validated and triaged by our internal security team; and findings disclosed under our coordination that are not in another CNA’s scope

cve.org/Media/News/item/news/2

New CVE Program Partner
CVE ProgramCVE_Program
2026-01-12

935 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of December 29, 2025

cisa.gov/news-events/bulletins

CVE ProgramCVE_Program
2026-01-08

Register now for “CVE/FIRST VulnCon 2026” on April 13–16, 2026!!!

In-person & virtual available: first.org/conference/vulncon26

The CVE Program and FIRST will co-host “VulnCon 2026” at the DoubleTree Resort by Hilton Hotel Paradise Valley - Scottsdale, in Scottsdale, Arizona, USA, on April 13–16, 2026. Registration, both virtual and in-person, is open on the FIRST website.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst