

This document details how Tenable updates CVE, CVSS, XCCDF and many other standards. Tenable describes its CVE usage, along with other standards, in a document available on its Support Portal titled "Standards Declarations". Should expect an update of your capability’s mappings to reflect newly

Map Currency Update Time ĭescribe how and where you explain to your customers the timeframe they Any discrepancy in CVE references are typically resolved the same day. Mappings are provided by Tenable’s Research team and audited both internally and from customer product use. Tenable only includes links to the CVE identifier. Tenable products do not include CVE entry content. To reflect new CVE versions and describe your approach to keeping reasonablyĬurrent with CVE versions when mapping them to your repository (required): Indicate how often you plan on updating the mappings If new, missing or corrected CVE entries exist, we modify our content accordingly. Tenable synchronizes CVE entries with National Vulnerability Database information daily. The most recent CVE version used to create or update its mappings (required): Mapping Questions Map Currency Indication ĭescribe how and where your capability indicates
