Your First Disclosure
A step-by-step walkthrough of the complete vulnerability disclosure workflow in CVEium CIS.
This guide walks you through the complete vulnerability disclosure workflow, from creating a product to publishing a VEX document.
Step 1: Create a product
- Navigate to Products in the sidebar
- Click New Product
- Fill in the product details:
- Name: Your software product name (e.g., "Acme Web Server")
- Slug: A URL-friendly identifier (auto-generated from the name)
- Vendor: Your organization name
- Optionally add a description, website URL, and repository URL
- Click Create Product
Step 2: Create a release
- From the product page, click New Release
- Enter the release details:
- Version: The version number (e.g., "2.1.0")
- Name: An optional release name (e.g., "February 2026 Patch")
- Release Date: When this version was or will be released
- Status: Set to "Active" for current releases
- Click Create Release
Step 3: Upload an SBOM
- From the release page, navigate to the SBOM tab
- Click Upload SBOM
- Select a CycloneDX or SPDX JSON file from your computer
- CVEium parses the file, extracts component information, and computes a SHA-256 hash for integrity
Your SBOM should be generated by your build system or an SBOM tool such as Syft, Trivy, or CycloneDX CLI.
Step 4: Wait for vulnerability scanning
After uploading the SBOM, CVEium automatically creates a match job that scans your components against 300,000+ known CVEs. The scan typically completes within a few seconds.
You can monitor the scan status on the SBOM page. Once complete, the results appear on the Triage tab.
Step 5: Triage vulnerabilities
- Navigate to the Triage tab on the release page
- You will see a list of all matched vulnerabilities with their CVE ID, severity, CVSS score, and affected component
- For each vulnerability, set a disposition:
- Affected: The vulnerability impacts your product and requires remediation
- Not Affected: The vulnerability does not impact your product (provide a justification)
- Fixed: The vulnerability has been remediated in this release
- Under Investigation: You are still evaluating the impact
- Add justification and impact statements as needed
Vulnerabilities flagged as KEV (Known Exploited Vulnerabilities) are highlighted in red and sorted to the top for priority attention.
All vulnerabilities must have a disposition (other than "Under Investigation") before you can generate a VEX document.
Step 6: Generate a VEX document
- Navigate to the VEX tab on the release page
- Click Generate VEX
- Choose a format:
- CycloneDX VEX: The most widely supported format
- OpenVEX: A lightweight VEX-only format
- CSAF: OASIS Common Security Advisory Framework
- Click Generate
The VEX document is created in Draft status.
Step 7: Submit for approval
- From the VEX tab, click Submit for Approval on the draft document
- Optionally add a comment for the reviewer
- Click Submit
The release is now locked to prevent changes while the VEX is under review.
Step 8: Approve and publish
An Owner or Admin on the team reviews the submission:
- Review the VEX document content
- Click Approve (or Reject to send it back to draft)
- After approval, click Publish
Publishing creates a permanent public disclosure with:
- A unique public URL for sharing
- A content hash for integrity verification
- An optional digital signature
Step 9: Share your disclosure
- Navigate to Disclosures in the sidebar
- Find your published disclosure in the list
- Copy the public link to share with downstream users, customers, or regulatory authorities
The disclosure is also available via the Public API for automated consumption.
What happens next
- Compliance reports: Generate an attestation report from the release page for auditors
- Ongoing monitoring: CVEium periodically re-scans your SBOMs against new CVEs
- Email notifications: Team owners and admins receive email alerts when new CVE matches are found
- SLA tracking: Monitor remediation deadlines based on vulnerability severity
Congratulations! You have completed the full vulnerability disclosure workflow.