Upwind raises $250M Series B to secure the cloud for the world →
Get a Demo

Cybersecurity vulnerabilities have been tracked since 1999, when the Internet Category of Attack (ICAT) toolkit began compiling attack scripts and made them available to developers to look up easily. ICAT evolved into the National Vulnerability Database (NVD) of today, holding over 150,000 vulnerabilities and adding tens of thousands more annually. Beyond the basics, we’re going over how complete the ever-expanding NVD is compared to other sources of cybersecurity intelligence, how quickly its threat scores are updated, and how to best use the NVD alongside multiple intelligence sources and behavioral analysis.

What is the National Vulnerability Database (NVD)?

The National Vulnerability Database (NVD) is a public repository maintained by the U.S. National Institute of Standards and Technology (NIST). It is a resource for cataloging and managing publicly disclosed cybersecurity vulnerabilities. Here are its core tasks:

The NVD does not discover vulnerabilities on its own. Instead, vulnerabilities are disclosed to the CVE system and MITRE, and CVE IDs are assigned through the work of researchers, vendors, and organizations that report them. 

Further, the NVD does not track active threats or real-time exploit activity. Instead, it provides context to help organizations assess and prioritize vulnerabilities based on their severity, exploitability, and potential impact. That helps teams make more informed decisions in security workflows.

Prioritize Identifying Vulnerabilities with Runtime Scanning from Upwind

Upwind’s runtime-powered container scanning helps you prioritize CVEs effectively by providing real-time threat detection, contextualized analysis, and remediation insights. Understand which vulnerabilities matter most to your unique workloads and resolve them faster — up to 10X faster than traditional methods.

Get a Demo

On Vulnerability Discovery and Reporting with the NVD

The NVD is a foundational resource for cataloging vulnerabilities, assigning standardized scores (CVSS), and providing contextual information. As a U.S. government agency project, the NVD is part of how the National Institute of Standards and Technology (NIST) supports national security, critical U.S. infrastructure, economic stability, and, indirectly, private organizations.

That said, real-world vulnerability management often extends beyond what the NVD alone can provide, given a list of vulnerabilities to root out and eliminate may only create a checklist of tasks that extend beyond the capacity of teams but offer little in the way of improved security.

“Many customers report that they have experienced alert overload and a lack of prioritization in their security practice. At Upwind, we focus on real risk – cutting down noise by 95% and helping customers get to the root cause 10 times faster.”

Joshua Burgin I CPO, Upwind

The NVD plays a significant role in cyber security. But its approach is cataloging, not action. So, teams will still need to identify the NVD’s listed vulnerabilities in their own systems and work to eliminate them efficiently, eliminating noise. They’ll also need to take note of the gaps in the NVD database. Let’s get a closer view of the vulnerability landscape of the NVD, looking at NVD challenges one at a time.

Timeliness and Delay in NVD Information

The NVD updates its records after ingesting and scoring CVE data. However, vendor advisories or dynamic threat intelligence platforms may update faster, especially when active exploitation is detected.

The solution is runtime security for real-time updates of exploits regardless of database timeliness or whether they’ve even been identified as vulnerabilities at the time of detection. Runtime security can also prioritize vulnerabilities actively being exploited in an organization’s environment, so less time is spent on vulnerabilities that aren’t critical.

An alert on an active exploit can point to zero-day attacks, even when they aren’t cataloged in the NVD.
An alert on an active exploit can point to zero-day attacks, even when they aren’t cataloged in the NVD.

Comprehensiveness of NVD Data

The NVD serves as a critical resource for cataloging vulnerabilities, but not all vulnerabilities are assigned CVE IDs, especially in niche or proprietary software. Further, as an American-managed system, the NVD may be biased toward software and disclosures from the U.S., potentially leaving out vulnerabilities in regional or less-documented ecosystems.

These gaps mean relying solely on the NVD could leave blind spots in vulnerability management strategy.

For instance, if an internal containerized application makes unexpected network connections or loads an unverified library during runtime, organizations would want to flag this behavior as a risk, even if there’s no corresponding CVE in the NVD.

A vulnerability in a custom internal API used only within your organization might not qualify for a CVE but could still be identified through runtime monitoring.
A vulnerability in a custom internal API used only within your organization might not qualify for a CVE but could still be identified through runtime monitoring.

Environment-Specific Threat Levels

While the NVD provides standardized vulnerability data, it doesn’t inherently prioritize or contextualize risks for specific environments. 

For personalized risk scores, organizations must correlate NVD data with runtime telemetry and attack path analysis, ensuring prioritized remediation.

Screenshot of a software application interface showing an overview of a cloud resource clustering. The layout includes a diagram of connections, resource risk analysis, general details, and container image information, with navigation menus on the left.
Behavioral analysis showing anomalous behavior in a resource, and suggesting a heightened threat organizationally versus the static threat rating that the NVD offers.

Benefits and Limitations of the NVD for Vulnerability Security

The NVD provides a foundational layer for vulnerability management with broad coverage and simple integration into pipelines.

Let’s break down its key features, benefits, and limitations to help organizations understand how to maximize its use while addressing potential gaps.

Facets of the NVDDescriptionStrengthsLimitations
ScopeCatalogs vulnerabilities with CVE IDs across software and hardware.Broad coverage of known vulnerabilities.Excludes niche or proprietary software vulnerabilities.
TimelinessUpdates vulnerability data after CVEs are assigned and enriched with CVSS scores.Standardized updates for many common vulnerabilities.May lag behind vendor advisories or threat intelligence feeds, especially during active exploitation.
CVSS ScoresAssigns severity scores based on the Common Vulnerability Scoring System (CVSS).Consistent framework for evaluating impact and prioritization.Scores lack environment-specific context.
Dependency AnalysisDoes not inherently analyze software stack dependencies.N/AMisses transitive vulnerabilities in layered dependencies.
Regional CoveragePrimarily based on disclosures from American organizations.Excellent for widely used software with global reporting.Regional biases may exclude vulnerabilities reported in non-U.S. contexts or languages.
Ease of IntegrationProvides APIs for automated integration with security tools (e.g., SIEMs, SOAR platforms).Enables integration into automated workflows.Limited by static data and requires enrichment for dynamic environments.

Organizations serious about vulnerability management often supplement the NVD with data from other large, reputable vulnerability databases to ensure comprehensive coverage and timeliness. So what are those, and how do they plug known gaps in the NVD? Here’s a breakdown of notable open-source and non-commercial databases:

1. MITRE CVE System

2. Exploit Database (Exploit-DB)

4. OSV (Open Source Vulnerabilities) Database

5. CISA Known Exploited Vulnerabilities Catalog

6. GitHub Security Advisories

How Organizations Can Maximize the Value of the NVD

The National Vulnerability Database catalogs cybersecurity risks, but it is most effective as part of a broader vulnerability management strategy. But how? Here’s how organizations can make the most of the NVD:

1. Pair NVD Data with Active Threat Intelligence

The NVD focuses on cataloging vulnerabilities, not tracking active exploit trends. Organizations must integrate the NVD with tools that track active exploitation, such as the CISA Known Exploited Vulnerabilities Catalog or real-time threat intelligence platforms.

The result? Organizations gain the ability to Identify which NVD-listed vulnerabilities are currently being exploited in their ecosystems and prioritize patching accordingly.

2. Use Runtime Monitoring to Identify Environment-Specific Risks

The NVD provides static threat scores (CVSS) but does not factor in unique environmental contexts, such as misconfigurations or layered dependencies. Runtime security is the key here, too. Deploy runtime monitoring tools to detect risks tied to your specific configurations, even if those risks aren’t directly linked to CVEs.

3. Supplement the NVD with Additional Databases

No single database is entirely comprehensive. Use complementary sources like:

4. Automate Vulnerability Management with NVD APIs

Automation reduces manual overhead and ensures consistent application of NVD data in security workflows. Use the NVD API to feed data into SIEM, SOAR, or use CNAPP tools that leverage NVD data for automated prioritization and remediation. 

Have a specific use case? Here’s how to augment the NVD’s strengths for complete coverage:

Use CaseNVD RoleComplementary ActionExample Tool
Identifying known vulnerabilitiesCatalogs CVEs and provides standardized metadataUse vendor advisories for faster updatesMicrosoft Security Advisories
Prioritizing high-risk vulnerabilitiesAssigns CVSS scoresCorrelate with runtime exploit activityCISA Known Exploited Vulnerabilities Catalog
Addressing open-source dependenciesIncludes some open-source vulnerabilitiesIntegrate with the OSV databaseGitHub Security Advisories
Detecting misconfigurationsNVD does not track configuration issuesUse runtime monitoring for real-time risk assessmentCSPM or a comprehensive CNAPP
Automating vulnerability workflowsProvides API accessEnrich with attack path analysisSIEM or SOAR tools

Organizations can create a more holistic vulnerability management strategy by combining the NVD’s foundational data with dynamic tools and complementary databases. This approach not only fills gaps in the NVD but also ensures timely and context-aware responses to evolving threats.

Upwind Superpowers Vulnerability Detection

It’s not just about listing vulnerabilities. It’s about knowing about them quickly, identifying zero days and those outside the scope of the NVD, and assessing criticality — not just overall, but for an organization’s specific, unique ecosystem.

Upwind makes identifying and mitigating vulnerabilities easier. See how. Schedule a demo today.

FAQ

What is the difference between NIST and the NVD?

NIST (National Institute of Standards and Technology) is a U.S. government agency that develops standards, guidelines, and tools to improve cybersecurity.

One of their projects is the NVD (National Vulnerability Database).

It’s a specific program operated by NIST that catalogs publicly disclosed vulnerabilities, enriches them with CVSS scores and other metadata, and provides tools for organizations to integrate that data into their security workflows.

Which is better? ISO or NIST?

Both are prominent frameworks for cybersecurity. Which one is right for you to adopt for compliance and certification? That depends.

ISO is best for global, high-level frameworks and certification (e.g., ISO 27001). It spans countries and industries, so it’s favored by multinational corporations.

NIST is more detailed and technical, widely used in U.S.-based organizations and industries like government and critical infrastructure. Companies choose NIST for detailed and flexible technical controls, especially in U.S. contexts.

How frequently is the NVD updated? 

The NVD is updated multiple times per day as new CVE entries are processed and given additional data, such as CVSS scores, CWE mappings, and affected software details. 

However, the timeliness of updates depends on when CVEs are disclosed and processed by MITRE and NIST. 

When would you use the NVD?

Teams use the NVD to:

It’s common for security solutions to use the NVD to enhance detection and analysis capabilities. Incorporating known vulnerabilities with runtime intelligence means companies can focus on critical risks and remediate vulnerabilities more efficiently, knowing they’re addressing those that make a difference in their own environments.