Table of Contents
1Scope
2References
3Definitions
4Abbreviationsandacronyms
5Conventions
6High-levelrequirements
7Accuracy
8Documentation
9CVEdateusage
10OldstyleCVEnamesupport
11RevocationofCVEcompatibility
12Reviewauthority
AnnexA-Type-specificrequirements
AnnexB-Mediarequirements
AnnexC-Mediarequirements Abstract
Gives a structured means to exchange information security vulnerabilities and exposures that provides common names for publicly known problems in the commercial or open source software used in communications networks, end-user devices, or any of the other types of information and communications technology (ICT) capable of running software.