Some of our data providers use these small typo to explain that a vulnerability affects multiple products and specially “previous version” of a product.
It’s been a year without posting, but not without work. Attentive user has found that we have put into production some changes, like CVSSv3, CPE search, and add some API. We also have added the possibility to change your monitoring email (Business and enterprise). And yes, we also have corrected some bugs ;) Let’s now talk about them.
After the last big update, we have decided to go into maintenance mode and made some code cleanup and rework. Minor change for you, but big update for us.
Yes, it’s done! Now, you an customize your monitored products and add, for each one, a CVSS Environmental Vector! But, wait! What is an Environmental Vector and what it can do for you? Simple, lower or higher the score of an Alert, based on YOUR Environment!
Our Team have integrated 61.240 NASL files, 58.288 Nessus exploits (without marked deprecated or empty) with 190.370+ cpes and 149.850+ "Security-database" References into our database. Integration is done automatically each day, without human interaction like usual. And off course, we have added them to each alert, alert History, CPE, Dashboard, API...
Happy new year 2014! Our Team have integrated 30.000+ Snort Rules into our database and have improved our vDNA API. Integration is done automatically each day, without human interaction like usual Of course, we have added them to each alert, alert History, CPE, Dashboard, API...
vDNA Crosslinks allows you to gather +80.000 Security Alerts data from Security-Database and export it as JSON format. Exports provide related Alert information. By that we mean, all alerts linked to the first one at specified depth.
CVE syntax is changing on January 1, 2014. Be prepared, modify and test your code. This modification is not a big deal, the last 4 fixed digits became arbitrary digits with a minimum of 4 and without a maximum.
We are continuously working to improve our database quality. For that, we have updated, again, our internal engine, corrected the OpenVAS integration, enhanced our CPE detection, updated the Microsoft and Cert hourly update, enhanced the user dashboard with some graph and more... But we also have integrated IAVM (DISA) into our database and improved our vDNA API.
Yes, we are continuously working to improve our database quality. For that, we have updated our internal engine, rewrite our SaintExploit and Metasploit integration to be able to store what Exploit(s) have been added to, or removed from an Alert. But we also have integrated OpenVAS into our database and improved our vDNA API.
Our Team is continuously working to improve our database quality and the way we display the information. For that, we have updated "Alert History" to let you access more information and rewrite our ExploitDB integration to be able to store what Exploit(s) have been added to, or removed from an Alert.