-

VulnCheck Adds Common Platform Enumeration (CPE) Data to its NVD++ Service to Improve Vulnerability Prioritization

Latest Update to Community Tier Offering Fills Information Gap and Reduces Industry’s Dependence on NIST NVD for Context on Vulnerable Software, Applications and Systems

LEXINGTON, Mass.--(BUSINESS WIRE)--VulnCheck, the exploit intelligence company, today announced it is enhancing its Community Tier service, NVD++, with Common Platform Enumeration (CPE) data currently missing from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). By enriching NVD++ with CPE data, VulnCheck is helping solve an industry-wide issue, enabling defenders to identify vulnerable assets for newly published Common Vulnerabilities and Exposures (CVEs) in the NVD.

CPE data plays a crucial role in vulnerability management by providing a standardized method for identifying and documenting software applications, operating systems, and hardware components. VulnCheck’s initial release of CPE enrichment in NVD++ will close the gap by close to half of the current CVEs missing critical CPE data, starting with the majority of the highest prevalence vendors and products where vulnerability management teams lack the data to measure local exposure.

The source data VulnCheck used to produce “known vulnerable configurations” containing CPEs in NVD++ is the same used by NIST. VulnCheck’s research team is investigating additional sources and prioritizing accuracy over quick coverage to expand CPE correlation in the coming weeks.

"Mapping software components to existing and new vulnerabilities is paramount for every cybersecurity company, product, and practitioner,” said Dmitry Raidman, CTO at Cybeats. “Many platforms and workflows globally rely on the existence of Common Platform Enumeration (CPE) records for every published vulnerability to determine which software and software versions are affected. It is great to see VulnCheck supporting the broader cybersecurity community by addressing the information gap, which helps continue vulnerability mapping for the industry."

Adding the missing CPE data to NVD++ enables teams to correlate OS / software packages, applications, devices and other assets with vulnerabilities to measure their exposure and prioritize response. The enhanced Community tier service provides practitioners with a stable alternative to the NVD that operates at the speed of business.

“The NIST NVD is a best-effort tool from the government and a foundation for vulnerability management,” said Anthony Bettini, founder and CEO at VulnCheck. “However, given ongoing reliability issues, we’re taking another step toward solving important challenges for our Community tier members. With CPE data, VulnCheck NVD++ now offers the missing link between vulnerabilities and impacted systems.”

VulnCheck first unveiled NVD++ on March 13, 2024. The Community tier service provides members with a reliable, high-performance source of NVD 2.0 and 1.0 CVE data via API or downloadable JSON files.

To access the solution and for more information on VulnCheck's Community tier offerings, visit https://vulncheck.com/community.

About VulnCheck

VulnCheck is the exploit intelligence company helping enterprises, government organizations, and cybersecurity vendors solve the vulnerability prioritization challenge. Trusted by some of the world's largest organizations responsible for protecting hundreds of millions of systems and people, VulnCheck helps organizations outpace adversaries by providing the most comprehensive, real-time vulnerability intelligence that is autonomously correlated with unique, proprietary exploit and threat intelligence.

Follow the company on LinkedIn, Mastodon, or X. To learn more about VulnCheck, visit https://vulncheck.com/.

Contacts

Jason Vancura
fama PR for VulnCheck
vulncheck@famapr.com

VulnCheck


Release Versions

Contacts

Jason Vancura
fama PR for VulnCheck
vulncheck@famapr.com

More News From VulnCheck

VulnCheck Exploit Intelligence Report Separates Real-World Exploitation Activity from Theoretical Vulnerability Risk

LEXINGTON, Mass.--(BUSINESS WIRE)--VulnCheck, the exploit intelligence company, today released the 2026 VulnCheck Exploit Intelligence Report (VEIR), a first-of-its-kind analysis of real-world exploitation trends and attacker behavior, along with its inaugural list of the 50 most routinely targeted vulnerabilities of the past year. By separating vulnerability disclosure data from confirmed exploitation, the report is designed to help security teams prioritize remediation based on operational ri...

VulnCheck Joins Operational Technology Cybersecurity Coalition to Advance Real-Time Exploit Intelligence

WASHINGTON & LEXINGTON, Mass.--(BUSINESS WIRE)--The Operational Technology Cybersecurity Coalition (OTCC) and VulnCheck today announced that VulnCheck has joined the coalition as its newest member, expanding efforts to strengthen the cybersecurity of operational technology (OT) environments and protect critical infrastructure as threats targeting industrial control systems and network-edge devices continue to increase. “There is growing urgency within the critical infrastructure segment to mode...

VulnCheck Establishes EMEA Headquarters in Cheltenham, UK Amid Soaring Global Demand for Exploit Intelligence

LEXINGTON, Mass.--(BUSINESS WIRE)--VulnCheck, the exploit intelligence company, today announced it is establishing its EMEA headquarters in Cheltenham, United Kingdom, following a year of regional growth, including 319% year-over-year EMEA ARR growth and 100% customer growth. The move will strengthen VulnCheck’s ability to support customers across Europe, the Middle East and Africa as demand for exploit intelligence increases. “EMEA has quickly become one of our fastest-growing regions globally...
Back to Newsroom