Vulnerability Development mailing list archives
vulnerability database
From: bvalenti () ETENSITY COM (Ben Valenti)
Date: Wed, 16 Feb 2000 15:37:13 -0500
I am in the process of creating a database of vulnerabilities/exploits. I was wondering if anyone, who as attempted such a task, could give me some description of their past experiences. To start, advice/tips on how to effectively structure the schema and where some good sources of data for DB population can be found. Also, are there any publically available vuln./exp. DB's either provided by commercial businesses or alternative sources? Thanks, _________________________________ Benjamin Valenti ~ Security Engineer Etensity, Inc. ~ www.etensity.com Direct: 703/827-5844 ~ Fax: 703/288-8234 <HR NOSHADE> <UL> <LI>application/x-pkcs7-signature attachment: smime.p7s </UL>
Current thread:
- WINS attack? Bryce Walter (Feb 10)
- Re: WINS attack? Seth R Arnold (Feb 10)
- Re: WINS attack? Blue Boar (Feb 10)
- Re: WINS attack? John Hall (Feb 11)
- IE Java Nicolas Rachinsky (Feb 12)
- Unreal Webserver Adam Boileau (Feb 13)
- Re: Unreal Webserver Arturo (Feb 14)
- vulnerability database Ben Valenti (Feb 16)
- Re: vulnerability database H D Moore (Feb 17)
- Re: vulnerability database Yiorgos Adamopoulos (Feb 17)
- Re: vulnerability database Iván Arce (Feb 17)
- Re: vulnerability database Dragos Ruiu (Feb 17)
- Re: vulnerability database Jay D. Dyson (Feb 17)
- Eudora incoming email affects behavior Thomas Kluegel (Feb 17)
- Re: Eudora incoming email affects behavior Jay D. Dyson (Feb 18)
- Re: Eudora incoming email affects behavior Bluefish (Feb 29)