www.cve.org Open in urlscan Pro
13.35.93.8  Public Scan

URL: https://www.cve.org/PartnerInformation/ListofPartners
Submission: On August 29 via api from TR — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

We're sorry but the CVE Website doesn't work properly without JavaScript
enabled. Please enable it to continue.
Skip to main content
About
OverviewHistoryProcessRelated EffortsMetrics
Partner Information
PartnerList of Partners
Program Organization
StructureProgram Relationship with PartnersBoardWorking GroupsCVE Numbering
AuthoritiesAuthorized Data Publishers
Downloads
Resources & Support
ResourcesGlossaryFAQs
AllRecentArchivesNewsletter Sign-Up
Reserve IDs & Publish RecordsCVE Services

Report/Request
CNAsNon-CNAs
Site Search
Find
Find CVE Records by keyword on cve.mitre.org.
Site Search


LIST OF PARTNERS

Links that redirect to external websites will open a new window or tab depending
on the web browser used.

Contact and other information for Top-Level Roots, Roots, CNAs, and CNA-LRs are
below. Select the partner’s name to view its information.

Request a CVE ID / Update a CVE Record

collapse

 1. To request a CVE ID from a CNA or CNA-LR, follow the Request a CVE ID
    instructions.
 2. To request an update to a CVE Record by a CNA, follow the Update a CVE
    Record instructions.

View the CVE Process page to learn about the CVE Record Lifecycle.

Program Roles / Organization Types

collapse

Program Roles

 * CVE Numbering Authority (CNA): An authorized entity with specific scope and
   responsibility to regularly assign CVE IDs and publish corresponding CVE
   Records.
 * CVE Numbering Authority of Last Resort (CNA-LR): A CNA authorized by a Root
   to assign CVE IDs and to publish corresponding CVE Records within that Root’s
   scope for vulnerabilities not covered by the Scope of another CNA.
 * Root: An organization authorized within the CVE Program that is responsible,
   within a specific Scope, for the recruitment, training, and governance of one
   or more entities that are a CNA, CNA-LR, or another Root.
 * Top-Level Root (TL-Root): The highest-level Root responsible for the
   governance and administration of a specified hierarchy, including Roots and
   CNAs within that hierarchy.

Organization Types

 * Vendor: An organization that sells products or services for which CVEs are
   applicable.
 * Researcher: An organization engaged in research resulting in identifying
   vulnerabilities for which CVEs are applicable.
 * Open Source: An organization that produces, manages, or maintains products or
   services having the source code freely available for possible modification
   and redistribution.
 * CERT: Computer Emergency Response Team.
 * Hosted Service: Any cloud-based services, platform as a service,
   infrastructure as a service, software as a service.
 * Bug Bounty Provider: Organization that acts as an intermediary between
   vendors and researcher and may reward individuals for discovering and
   reporting software vulnerabilities.
 * Consortium: A group of entities that have joined together to work on a
   particular project.


SEARCH

search

loading

Search Tips

Search for a CNA partner by name, scope keyword(s), program role, or
organization type.
For example: “Top-Level Root”, “Root”, or “CNA-LR”, finds partners by their
Program Role.

Use “Sort by” to refine your search.

--------------------------------------------------------------------------------

401 partners

Show:
10All
Sort by:
Partner (A to Z)Partner (Z to A)

PartnerPartnerScope Program Role Organization Type Country* 1E Limited1E
LimitedAll 1E products (including end-of-life/end-of-service products), as well
as vulnerabilities in third-party software discovered by 1E that are not in
another CNA’s scopeCNAVendor, ResearcherUK42Gears Mobility Systems Pvt
Ltd42Gears Mobility Systems Pvt Ltd42Gears branded products and technologies
onlyCNAVendorIndia9front Systems9front SystemsAll software produced as part of
the Plan9front open source operating system, as well as its applications and
cyberinfrastructure. Vulnerabilities discovered by or reported to 9front Systems
for all Plan 9 software not covered by the scope of another CNACNAOpen
SourceUSAAbsolute SoftwareAbsolute SoftwareAbsolute issues
onlyCNAVendorUSAAcronis International GmbHAcronis International GmbHAll Acronis
products, including Acronis Cyber Protect, Acronis Cyber Protect Home Office,
Acronis DeviceLock DLP, and Acronis Snap DeployCNAVendorSwitzerlandAdobe Systems
IncorporatedAdobe Systems IncorporatedAdobe issues onlyCNAVendorUSAAdvanced
Micro Devices Inc.Advanced Micro Devices Inc.AMD branded products and
technologies onlyCNAVendorUSAAirbusAirbusAll Airbus products (supported products
and end-of-life/end-of-service products), as well as vulnerabilities in
third-party software discovered by Airbus that are not in another CNA’s
scopeCNAVendor, ResearcherNetherlandsAlgoSecAlgoSecAlgoSec products
onlyCNAVendorIsraelAlias Robotics S.L.Alias Robotics S.L.All Alias Robotics
products, as well as vulnerabilities in third-party robots and robot components
(software and hardware), as well as machine tool and machine tool components,
discovered by Alias Robotics that are not in another CNA’s scopeCNAVendor,
ResearcherSpain

* Self-identified by CNA

previous page button

next page button

 * 1
 * 2
 * 3
 * 4
 * 5
 * 6
 * 7
 * 8
 * 9
 * 10
 * 11
 * 12
 * 13
 * 14
 * 15
 * 16
 * 17

No results found for

Provide feedback for this page

Survey opens in a new tab or window depending on browser settings

Partner Information

 * Partner
   
   collapse

 * List of Partners
   
   expand

POLICIES & COOKIES

 * Terms of Use
 * Website Security Policy
 * Privacy Policy
 * Cookie Notice
 * Manage Cookies

MEDIA

 * News
 * Blogs
 * Podcasts
 * Email newsletter sign up

SOCIAL MEDIA

github

linkedin

mastodon

youtube

medium

x-twitter icon for @CVEnew

New CVE Records

x-twitter icon for @CVEannounce

CVE Announce

CONTACT

 * CVE Program Support
   
   external site

 * CNA Partners
 * CVE Website Support
   
   external site

 * CVE Program Idea Tracker
   
   external site

Use of the CVE® List and the associated references from this website are subject
to the terms of use. CVE is sponsored by the U.S. Department of Homeland
Security (DHS)

external link

Cybersecurity and Infrastructure Security Agency (CISA)

external link

. Copyright © 1999-2024, The MITRE Corporation

external link

. CVE and the CVE logo are registered trademarks of The MITRE Corporation.