logo
DATABASE RESOURCES PRICING ABOUT US

Vulnerability Databases: Classification and Registry

Description

What publicly available Vulnerability Databases do we have? Well, I can only say that there are a lot of them and they are pretty different. Here I make an attempt to classify them. It's quite an ungrateful task. No matter how hard you try, the final result will be rather inaccurate and incomplete. I am sure someone will be complaining. But this is how I see it. ![😉](https://s.w.org/images/core/emoji/11/72x72/1f609.png) If you want to add or change something feel free to make a comment bellow or email [me@avleonov.com](<mailto:me@avleonov.com>). The main classifier, which I came up with: * There are individual vulnerability databases in which one identifier means one vulnerability. They try to cover all existing vulnerabilities. * And others are security bulletins. They cover vulnerabilities in a particular product or products. And they usually based on on patches. One patch may cover multiple vulnerabilities. I made this diagram with some Vulnerability Databases. Note that I wanted to stay focused, so there are no exploit DBs, CERTs, lists of vulnerabilities detected by some researchers ([CISCO Talos](<https://www.talosintelligence.com/vulnerability_info>), [PT Research](<https://www.ptsecurity.com/ww-en/analytics/threatscape/>), etc.), Media and Bug Bounty sites. ![Vulnerability Databases classification](https://avleonov.com/wp-content/uploads/2018/06/vulnerability_databases103-1024x638.png) For these databases the descriptions of vulnerabilities are publicly available on the site (in html interface or downloadable data feed), or exist in a form of paid Vulnerability Intelligence service (for example, [Flexera](<https://www.flexera.com/products/software-vulnerability-management/software-vulnerability-manager.html>)). On one side there are databases of individual vulnerabilities, the most important is [National Vulnerability Database](<https://nvd.nist.gov/>). There are also Chinese, Japanese bases that can be derived from NVD or not. On the other side we have security bulletins, for example [RedHat Security Advisories](<https://www.redhat.com/archives/rhsa-announce/>). And in the middle we have a Vulnerability Databases, for which it is not critical whether they have duplicated vulnerability IDs or not. These are the Vulnerability Databases of aggregators, vulnerability scanners, security content databases. We can say that [CIS OVAL](<https://oval.cisecurity.org/>) or [OpenVAS NVTs](<http://www.openvas.org/openvas-nvt-feed.html>) are the forms of public security content. Russian [FSTEC BDU Vulnerability Database](<https://bdu.fstec.ru/vul>) also has individual vulnerabilities and security bulletins. ### Classification I have the following groups: 1. Individual Vulnerabilities 2. Individual Vulnerabilities -> Government 3. Individual Vulnerabilities -> Commercial Vulnerability Scanners and Aggregators 4. Mixed Individual Vulnerabilities and Security Bulletins -> Commercial Vulnerability Scanners and Aggregators 5. Mixed Individual Vulnerabilities and Security Bulletins -> Government 6. Mixed Individual Vulnerabilities and Security Bulletins -> Open and formalized detection rules 7. Security Bulletins 8. Security Bulletins -> All software in repository ### Registry I was trying to give a link on the same ["Drupalgedon2" CVE-2018-7600](<https://github.com/jirojo2/drupalgeddon2>) vulnerability in examples, where it was possible. I mentioned the ways to grab all the entries from particular Vulnerability Database in the Aggregation column. Most of this methods are provided by the owner of the Database ("official") or in a form of [Vulners collections](<https://avleonov.com/2016/10/24/processing-vulners-collections-using-python/>). Name | Classification Group | Description | Example of content | Aggregation ---|---|---|---|--- [Mitre CVE](<https://cve.mitre.org/>) | Individual Vulnerabilities | Coordinate the release of CVE identifiers | [CVE-2018-7600](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7600>) | [Official](<https://cve.mitre.org/data/downloads/index.html>) [IBM X force](<https://exchange.xforce.ibmcloud.com/>) | Individual Vulnerabilities | Threat and Vulnerability Intelligence service | [CVE-2018-7600](<https://exchange.xforce.ibmcloud.com/vulnerabilities/140913>) | n/a [NIST NVD](<https://nvd.nist.gov/>) | Individual Vulnerabilities -> Government | The NVD is the U.S. government repository of standards based vulnerability management data | [CVE-2018-7600](<https://nvd.nist.gov/vuln/detail/CVE-2018-7600>) | [Official](<https://nvd.nist.gov/vuln/data-feeds>), [Vulners](<https://vulners.com/stats>) [CNNVD](<http://www.cnnvd.org.cn/>) | Individual Vulnerabilities -> Government | China National Vulnerability Database of Information Security | [CNNVD-201803-1136](<http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201803-1136>) | [Official](<http://www.cnnvd.org.cn/web/xxk/xmlDown.tag>) [CNVD](<http://www.cnvd.org.cn/>) | Individual Vulnerabilities -> Government | China National Vulnerability Database | [CNTA-2018-0012](<http://www.cnvd.org.cn/webinfo/show/4463>) | n/a [JVN](<https://jvn.jp>) | Mixed Individual Vulnerabilities and Security Bulletins -> Government | Japan Vulnerability Notes | [JVN#65268217](<https://jvn.jp/jp/JVN65268217/index.html>) | n/a [BDU Fstec](<https://bdu.fstec.ru/>) | Mixed Individual Vulnerabilities and Security Bulletins -> Government | Russian Data Security Threats Database | [BDU:2018-00749](<https://bdu.fstec.ru/vul/2018-00749>) | [Official](<https://bdu.fstec.ru/vul>) [Risk Based Security VulnDB](<https://vulndb.cyberriskanalytics.com/>) | Individual Vulnerabilities -> Commercial Vulnerability Scanners and Aggregators | Vulnerability Intelligence vendor | n/a | n/a [Flexera](<https://www.flexera.com/products/software-vulnerability-management/software-vulnerability-manager.html>) | Individual Vulnerabilities -> Commercial Vulnerability Scanners and Aggregators | Vulnerability Intelligence vendor | n/a | n/a [Beyond Security SecuriTeam](<http://www.securiteam.com/>) | Individual Vulnerabilities -> Commercial Vulnerability Scanners and Aggregators | Vulnerability Management vendor | [CVE-2016-9939](<http://www.securiteam.com/securitynews/5LP3G20MKY.html>) | n/a [VulDB](<https://vuldb.com/>) | Individual Vulnerabilities -> Commercial Vulnerability Scanners and Aggregators | "Number 1 vulnerability database worldwide with more than 117000 entries available." | [CVE-2018-7600](<https://vuldb.com/?id.115197>) | n/a [vFeed](<https://vfeed.io/>) | Mixed Individual Vulnerabilities and Security Bulletins -> Commercial Vulnerability Scanners and Aggregators | "Trusted Vulnerability & Threat Intelligence Database" | n/a | [Official](<https://vfeed.io/pricing/>) [Vulners](<https://vulners.com/>) | Mixed Individual Vulnerabilities and Security Bulletins -> Commercial Vulnerability Scanners and Aggregators | "Complete Vulnerability DataBase & Security Scanne" | [CVE-2018-7600](<https://vulners.com/cve/CVE-2018-7600>) | [Official](<https://vulners.com/cve/stats>) [Tenable](<https://www.tenable.com/plugins>) | Mixed Individual Vulnerabilities and Security Bulletins -> Commercial Vulnerability Scanners and Aggregators | Tenable Nessus Attack Scripting Language (NASL) plugins | [CVE-2018-7600](<https://www.tenable.com/plugins/nessus/109041>) | [Vulners](<https://vulners.com/stats>) [Snyk](<https://snyk.io/vuln/>) | Mixed Individual Vulnerabilities and Security Bulletins -> Commercial Vulnerability Scanners and Aggregators | "Snyk helps you use open source and stay secure." | [CVE-2018-7600](<https://snyk.io/vuln/SNYK-PHP-DRUPALCORE-72112>) | n/a [Rapid7](<https://www.rapid7.com/db>) | Mixed Individual Vulnerabilities and Security Bulletins -> Commercial Vulnerability Scanners and Aggregators | "Vulnerability & Exploit Database" | [CVE-2018-7600](<https://www.rapid7.com/db/vulnerabilities/drupal-cve-2018-7600>) | n/a [Altx-Soft OVAL Repository](<https://ovaldb.altx-soft.ru/>) | Mixed Individual Vulnerabilities and Security Bulletins -> Commercial Vulnerability Scanners and Aggregators | ALTEX-SOFT-owned OVAL repository | [CVE-2018-7600](<https://ovaldb.altx-soft.ru/Definition.aspx?id=oval:com.altx-soft.nix:def:19053>) | n/a [SecPod SCAP Repo](<https://www.scaprepo.com/>) | Mixed Individual Vulnerabilities and Security Bulletins -> Commercial Vulnerability Scanners and Aggregators | SecPod-owned OVAL repository | [CVE-2018-7600](<https://www.scaprepo.com/control.jsp?command=relation&relationId=oval:org.secpod.oval:def:603336>) | n/a [OpenVAS NVT](<http://www.openvas.org/openvas-nvt-feed.html>) | Mixed Individual Vulnerabilities and Security Bulletins -> Open and formalized detection rules | "Public feed of Network Vulnerability Tests (NVTs) for the OpenVAS project" | n/a | [Vulners](<https://vulners.com/stats>) [CIS OVAL](<https://oval.cisecurity.org/>) | Mixed Individual Vulnerabilities and Security Bulletins -> Open and formalized detection rules | Main database of OVAL content sponsored by Center for Internet Security | n/a | [Official](<https://oval.cisecurity.org/repository/download>) [CentOS CESA](<https://lists.centos.org/pipermail/centos-announce/>) | Security Bulletins -> All software in repository | The CentOS-announce Archives | [CESA-2014:0376](<https://lists.centos.org/pipermail/centos-announce/2014-April/020249.html>) | [Vulners](<https://vulners.com/stats>) [Ubuntu USN](<https://usn.ubuntu.com/>) | Security Bulletins -> All software in repository | Ubuntu security notices | [USN-2165-1](<https://usn.ubuntu.com/2165-1/>) | [Vulners](<https://vulners.com/stats>) [RedHat RHSA](<https://www.redhat.com/archives/rhsa-announce/>) | Security Bulletins -> All software in repository | The RedHat-announce Archives | [RHSA-2014:0376](<https://access.redhat.com/errata/RHSA-2014:0376>) | [Vulners](<https://vulners.com/stats>) [Debian DSA](<https://www.debian.org/security/>) | Security Bulletins -> All software in repository | Debian Security Advisories | [DSA-4156-1](<https://www.debian.org/security/2018/dsa-4156>) | [Vulners](<https://vulners.com/stats>) Microsoft KB | Security Bulletins | Microsoft Knowledge Base | [KB4013389](<https://support.microsoft.com/kb/4013389>) | n/a [Microsoft MS](<https://docs.microsoft.com/en-us/security-updates/securitybulletins/securitybulletins>) | Security Bulletins | Microsoft Security Bulletin | [MS17-10](<https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010>) | n/a [CISCO SA](<https://tools.cisco.com/security/center/mpublicationListingDetails.x?docType=CiscoSecurityAdvisory>) | Security Bulletins | Cisco Security Advisories | [cisco-sa-20180521](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel>) | [Vulners](<https://vulners.com/stats>) [OpenSSL Vulnerabilities](<https://www.openssl.org/news/vulnerabilities.html>) | Security Bulletins | OpenSSL Vulnerabilities | [CVE-2018-0737](<https://www.openssl.org/news/secadv/20180416.txt>) | [Vulners](<https://vulners.com/stats>) [Apache](<https://httpd.apache.org/security_report.html>) | Security Bulletins | Security Problems with the Apache HTTP Server | [CVE-2017-9798](<https://httpd.apache.org/security/vulnerabilities_22.html>) | [Vulners](<https://vulners.com/stats>) [Mozilla MFSA](<https://www.mozilla.org/en-US/security/advisories/>) | Security Bulletins | Mozilla Foundation Security Advisories | [mfsa2018-13](<https://www.mozilla.org/en-US/security/advisories/mfsa2018-13/>) | [Vulners](<https://vulners.com/stats>) ### Other Vulnerability Databases Of course this table is far from being complete. It's a basic structure, just to give an overall picture. You can find more: * Different Vulnerability Databases in [Vulnerability Database Catalog by FIRST.org](<https://www.first.org/global/sigs/vrdx/vdb-catalog>). * Security Bulletins for different Operating Systems and Software at [Vulners.com stats page](<https://vulners.com/stats>) (blocks "Unix" and "Software"). * Bases of OVAL content listed at [MITRE OVAL Product List](<https://oval.mitre.org/adoption/productlist.html>) (it is in archive state; see the type "Definition Repository") Do you know any other interesting sources about known software vulnerabilities? Feel free to mention them in the comments bellow. ![](http://feeds.feedburner.com/~r/avleonov/~4/o1m4yya8LXc)


Related