- Use cases
Maintain constant monitoring of your cloud configuration to reduce risks of misconfiguration.
VulDB was integrated by Mindflow to enable users to automate their incident management and better protect their information systems.
VulDB is a vulnerability database platform that collects, maintains, and provides information about known electronic product vulnerabilities. Today, the company holds one of the most exhaustive vulnerability databases, with more than 210.000 entries documenting vulnerabilities. These vulnerabilities are discovered by the company or other organizations or submissions to their website. Once curated, the platform assigns a Common Vulnerability and Exposure ID. The CVE listed will comprise a description of the vulnerability and attack method, the reference, and the release date.
VulDB addresses three categories of customers. First, the platform provides Ongoing Vulnerability Management information for IT administrators and SOC to know who the attackers are, the vulnerabilities exploited, and most of all, what the countermeasures are to react as quickly as possible. Second, VulDB provides Extended Vulnerability Research for IT admins, security testers, and vendors to help them analyze to improve their understanding of the vulnerabilities, exploits, and trends. Finally, VulDB delivers Cyber Threat Intelligence to multinational companies, governments, and vendors to help them a technical and geopolitical insight about current threats, actors, and activities to build an anticipation capacity. Mindflow has integrated VulDB’s API to enable its customers to automate the enrichment of vulnerabilities from its platform.
The team monitors various sources to disclose information about new or known vulnerabilities. These sources go from vendor sites or mailing lists, vulnerability contributors, vulnerability databases, code repositories, news sites and blogs, social networks, vulnerability brokers, marketplaces, and darknet, to internal testing.
The platform does its best to maintain up-to-date entries. To that end, it prioritizes entries according to SLA agreements concluded with its customers, the product’s popularity, the entry’s popularity, and the distribution in professional environments.
As vulnerabilities change over time, a new exploit could be published, or the issue at the origin of the vulnerability might get fixed. This is why the company is updating its entries regularly. The history of commits is stored within a private blockchain to attest these changes and ensure that all of them are tracked.
VulDB is a certified CVE Numbering Authority and Authorized Data Publisher by the NIST to assign CVE IDs to discovered vulnerabilities and update their records. Also, the company follows the naming scheme of various NIST established standards besides following CVSS to assess scores of discovered security issues.
Besides assigning risk metrics to the discovered vulnerabilities, the company also gathers scores from multiple sources such as vendors, researchers, NVD, and CNA to provide a CVSS Meta Score to the customers.
Based on a mathematical algorithm developed by VulDB teams, the exploit price calculation predicts generic prices considering the vulnerability details and market observation (news reports, articles, vulnerability broker price lists, forums, or darknet discussions). As the price evolves, customers can infer the popularity of the vulnerability and its level of active exploitation.
VulDB is hosted in Switzerland and carefully manages its dependencies to avoid creating links to other organizations or countries that may generate a subjection to particular laws.
VulDB provides the most exhaustive vulnerability database with features such as exploit price, exploit prediction scoring system, and CVSS meta scores.
Thanks to these features, the platform can provide helpful information to multiple types of customers, ranging from SOCs to governments, to solve proper vulnerability management or perform cyber threat intelligence on a strategic level.
The platform is also community-driven, where users can submit vulnerabilities, comment on them or make edit suggestions. Coupled with an expert team, it helps to keep the database up-to-date and enrich new or existing vulnerabilities.
Want to enhance your service with orchestration and automation capabilities? Get in touch with our partner team.