loader image

VulDB

x Mindflow

VulDB Overview

VulDB was integrated by Mindflow to enable users to automate their incident management and better protect their information systems.

What is VulDB?

VulDB is a vulnerability database platform that collects, maintains, and provides information about known electronic product vulnerabilities. Today, the company holds one of the most exhaustive vulnerability databases, with more than 210.000 entries documenting vulnerabilities. These vulnerabilities are discovered by the company or other organizations or submissions to their website. Once curated, the platform assigns a Common Vulnerability and Exposure ID. The CVE listed will comprise a description of the vulnerability and attack method, the reference, and the release date. vuldb stats-min

Who can use VulDB?

VulDB addresses three categories of customers. First, the platform provides Ongoing Vulnerability Management information for IT administrators and SOC to know who the attackers are, the vulnerabilities exploited, and most of all, what the countermeasures are to react as quickly as possible. Second, VulDB provides Extended Vulnerability Research for IT admins, security testers, and vendors to help them analyze to improve their understanding of the vulnerabilities, exploits, and trends. Finally, VulDB delivers Cyber Threat Intelligence to multinational companies, governments, and vendors to help them a technical and geopolitical insight about current threats, actors, and activities to build an anticipation capacity. Mindflow has integrated VulDB’s API to enable its customers to automate the enrichment of vulnerabilities from its platform.

VulDB Features

Sources

The team monitors various sources to disclose information about new or known vulnerabilities. These sources go from vendor sites or mailing lists, vulnerability contributors, vulnerability databases, code repositories, news sites and blogs, social networks, vulnerability brokers, marketplaces, and darknet, to internal testing.

Updates

The platform does its best to maintain up-to-date entries. To that end, it prioritizes entries according to SLA agreements concluded with its customers, the product’s popularity, the entry’s popularity, and the distribution in professional environments. vuldb updates-min

Changes commits

As vulnerabilities change over time, a new exploit could be published, or the issue at the origin of the vulnerability might get fixed. This is why the company is updating its entries regularly. The history of commits is stored within a private blockchain to attest these changes and ensure that all of them are tracked.

Following international standards

VulDB is a certified CVE Numbering Authority and Authorized Data Publisher by the NIST to assign CVE IDs to discovered vulnerabilities and update their records. Also, the company follows the naming scheme of various NIST established standards besides following CVSS to assess scores of discovered security issues.

Metrics aggregated

Besides assigning risk metrics to the discovered vulnerabilities, the company also gathers scores from multiple sources such as vendors, researchers, NVD, and CNA to provide a CVSS Meta Score to the customers. vuld scores-min

Exploit prices

Based on a mathematical algorithm developed by VulDB teams, the exploit price calculation predicts generic prices considering the vulnerability details and market observation (news reports, articles, vulnerability broker price lists, forums, or darknet discussions). As the price evolves, customers can infer the popularity of the vulnerability and its level of active exploitation.

Data sovereignty

VulDB is hosted in Switzerland and carefully manages its dependencies to avoid creating links to other organizations or countries that may generate a subjection to particular laws.

VulDB benefits

VulDB provides the most exhaustive vulnerability database with features such as exploit price, exploit prediction scoring system, and CVSS meta scores.

Thanks to these features, the platform can provide helpful information to multiple types of customers, ranging from SOCs to governments, to solve proper vulnerability management or perform cyber threat intelligence on a strategic level.

The platform is also community-driven, where users can submit vulnerabilities, comment on them or make edit suggestions. Coupled with an expert team, it helps to keep the database up-to-date and enrich new or existing vulnerabilities.  

Want to enhance your service with orchestration and automation capabilities? Get in touch with our partner team.

Related integrations