The vFeed Database regarding our Consultancy / Integrator plans has been updated and now available for download. Check the new changes.
FruityWifi is an open source tool to audit wireless networks. It allows the user to deploy advanced attacks by directly using the web interface or by sending messages to it. With the version 2.0, the author added a new module to support the capabilities of vulnerability search through vFeed Database.
The folks at Sec4U (not affiliated with vFeed IO) has released a very beautiful web interface for vFeed Community Vulnerability Database. The interface allows search by products and by CVE.
The spanish company S2 Grupo has publish an article showing how they leverage the power of vFeed database correlation to empower their SIEM solution. The article shed light on a neat way to enrich vulnerability and IDS solution with the appropriate correspondence of information such as Nessus plugins, Snort and Suricata SIDs.
During Splunk Worldwide Users’ Conference .Conf2015, Craig Merchant (Senior Security Architect at Oracle) presented a very interesting talk about how to explore the capabilities of free tools and make the most of them using Splunk.
vFeed Database was recently leveraged in a SANS Institute infosec reading room paper called “Applying Data Analytics on Vulnerability Data” for GIAC GCIH Gold Certification. The main purpose was to enrich a Nessus based vulnerability scan results with information extracted from vFeed. The paper shows how powerful was vFeed when it comes to vulnerability correlation. […]
vFeed Framework is a CVE, CWE and OVAL Compatible naming scheme concept that provides extra structured detailed third-party references and technical characteristics for a CVE entry through an extensible XML/JSON schema. It also improves the reliability of CVEs by providing a flexible and comprehensive vocabulary for describing the relationship with other standards and security references.
vFeed Framework is a CVE, CWE and OVAL Compatible naming scheme concept that provides extra structured detailed third-party references and technical characteristics for a CVE entry through an extensible XML/JSON schema. It also improves the reliability of CVEs by providing a flexible and comprehensive vocabulary for describing the relationship with other standards and security references.