National Vulnerability Database

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

The National Vulnerability Database is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics. NVD supports the Information Security Automation Program (ISAP).

On Friday March 8, 2013, the database was taken offline after it was discovered that the system used to run multiple government sites had been compromised by a software vulnerability of Adobe ColdFusion.[1][2]

On June 2017, threat intel firm Recorded Future revealed that the median leg between a CVE2 being revealed to ultimately being published to the NVD is 7 days and that 75% of vulnerabilities are published unofficially before making it to the NVD, giving attackers time to exploit the vulnerability.[3]

In addition to providing a list of Common Vulnerabilities and Exposures (CVEs), the NVD scores vulnerabilities using the Common Vulnerability Scoring System (CVSS) which is based on a set of equations using metrics such as access complexity and availability of a remedy.[4]

See also[edit]

References[edit]

  1. ^ "Adobe software vulnerabilities blamed for NIST NVD infection."
  2. ^ "US national vulnerability database hacked."
  3. ^ "75% of Vulns Shared Online Before NVD Publication"
  4. ^ "NVD - CVSS v2 Equations". nvd.nist.gov. Archived from the original on 2013-12-21.

External links[edit]