CVE is an international naming convention that assigns unique identifiers (CVE-IDs) to publicly disclosed software vulnerabilities, functioning as a common language that enables security professionals to accurately reference vulnerabilities.
"That vulnerability," "the Apache thing"—vague references like these make security response impossible. CVE is an international system that assigns unique identifiers such as CVE-2024-12345 to publicly disclosed vulnerabilities, enabling developers, security vendors, operations teams, and regulators to discuss the same vulnerability without ambiguity.
The program is operated by MITRE, a U.S. nonprofit organization, with individual vendors and research institutions holding ID assignment authority as CNAs (CVE Numbering Authorities). As of 2024, the number of CNAs has grown to over 400 organizations, and the lead time from vulnerability reporting to ID assignment has been trending shorter.
The format is CVE-YYYY-NNNNN, where YYYY is the year of assignment and NNNNN is a sequential number. One important point: the assignment year is neither the year the vulnerability was discovered nor the year it was publicly disclosed—it is the year the ID was reserved. Because there is often a time lag between reservation and publication, it is not uncommon for a CVE reserved in 2023 to have its details published in 2024.
The CVE-ID itself contains no severity information. Severity is indicated by a CVSS (Common Vulnerability Scoring System) score, and the NVD (National Vulnerability Database) assigns and publishes CVSS scores for CVEs. Unlike categorical classifications such as the OWASP Top 10, a key characteristic of CVE is that it refers to individual vulnerability instances.
CyberGym is a benchmark that uses known CVEs as subjects to measure the attack reproduction capabilities of AI models, making the CVE database an indispensable foundation for its evaluation. Meanwhile, vulnerabilities discovered by Claude Mythos in Project Glasswing are zero-day vulnerabilities that have not yet been assigned a CVE-ID; they are only registered as CVEs after going through Responsible Disclosure.
The combination of SBOM and CVE is extremely powerful in practice. By using an SBOM to track all dependencies in your own product and cross-referencing it each time a new CVE is published, you can answer the question "Does this vulnerability affect our product?" within minutes. In the initial response to supply chain attacks, this difference in speed can be decisive.



A2A (Agent-to-Agent Protocol) is a communication protocol that enables different AI agents to perform capability discovery, task delegation, and state synchronization, published by Google in April 2025.

Acceptance testing is a testing method that verifies whether developed features meet business requirements and user stories, from the perspective of the product owner and stakeholders.

AES-256 is the highest-strength encryption algorithm using a 256-bit key length within AES (Advanced Encryption Standard), a symmetric-key cryptographic scheme standardized by the National Institute of Standards and Technology (NIST).

A mechanism that controls task distribution, state management, and coordination flows among multiple AI agents.

Agent Skills are reusable instruction sets defined to enable AI agents to perform specific tasks or areas of expertise, functioning as modular units that extend the capabilities of an agent.