<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CVE on ap7i.com</title>
    <link>https://ap7i.com/tags/cve/</link>
    <description>Recent content in CVE on ap7i.com</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 17 Apr 2026 12:21:14 -0400</lastBuildDate>
    <atom:link href="https://ap7i.com/tags/cve/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>NIST Gives Up on Enriching Most CVEs</title>
      <link>https://ap7i.com/posts/nist-nvd-triage/</link>
      <pubDate>Fri, 17 Apr 2026 12:21:14 -0400</pubDate>
      <guid>https://ap7i.com/posts/nist-nvd-triage/</guid>
      <description>On April 15, NIST announced that the National Vulnerability Database will only enrich CVEs that affect federal software, critical infrastructure, or vulnerabilities CISA already sees being exploited. Everything else gets filed as &amp;lsquo;Not Scheduled.&amp;rsquo; The quiet consequence: the vulnerability scanners your organization relies on may start missing things — and showing green anyway.</description>
    </item>
  </channel>
</rss>
