Featured Research

from universities, journals, and other organizations

Comprehensive Database Of Computer Vulnerabilities Now Available

Date:
August 11, 2005
Source:
National Institute Of Standards And Technology
Summary:
Cyber attackers are constantly scanning the Internet looking for vulnerabilities in computer systems that will enable them to take control and use the systems for illegal or unethical activities such as identity theft, industrial espionage or distributing spam. For those trying to prevent such attacks, keeping up with the 300 or so new vulnerabilities discovered each month can be an overwhelming task, especially since a single flaw can be known by numerous names.

Cyber attackers are constantly scanning the Internet looking for vulnerabilities in computer systems that will enable them to take control and use the systems for illegal or unethical activities such as identity theft, industrial espionage or distributing spam. For those trying to prevent such attacks, keeping up with the 300 or so new vulnerabilities discovered each month can be an overwhelming task, especially since a single flaw can be known by numerous names.

Related Articles


The new National Vulnerability Database (NVD) from the National Institute of Standards and Technology (NIST) will make it easier for system administrators and other security professionals to learn about vulnerabilities and how to remediate them. The NVD is a comprehensive database that integrates all publicly available U.S. government resources on vulnerabilities and provides links to many industry resources. NVD is built upon a dictionary of standardized vulnerability names and descriptions called Common Vulnerabilities and Exposures.

Updated daily, NVD currently contains information on almost 12,000 vulnerabilities. It allows users to search by a variety of characteristics, including vulnerability type, severity and impact; software name and version number; and vendor name. NVD also can be used to research the vulnerability history of a product and view vulnerability statistics and trends.

NVD was developed by researchers in NIST’s Computer Security Division with support from the Department of Homeland Security’s National Cyber Security Division. For more information, go to http://nvd.nist.gov/.


Story Source:

The above story is based on materials provided by National Institute Of Standards And Technology. Note: Materials may be edited for content and length.


Cite This Page:

National Institute Of Standards And Technology. "Comprehensive Database Of Computer Vulnerabilities Now Available." ScienceDaily. ScienceDaily, 11 August 2005. <www.sciencedaily.com/releases/2005/08/050811090010.htm>.
National Institute Of Standards And Technology. (2005, August 11). Comprehensive Database Of Computer Vulnerabilities Now Available. ScienceDaily. Retrieved December 22, 2014 from www.sciencedaily.com/releases/2005/08/050811090010.htm
National Institute Of Standards And Technology. "Comprehensive Database Of Computer Vulnerabilities Now Available." ScienceDaily. www.sciencedaily.com/releases/2005/08/050811090010.htm (accessed December 22, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Monday, December 22, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Can Bitcoin Survive 2015?

Can Bitcoin Survive 2015?

Newsy (Dec. 22, 2014) Bitcoin's stock has tumbled significantly this year, but more companies now accept it, leading supporters and critics alike to weigh in on its future. Video provided by Newsy
Powered by NewsLook.com
Touch-Free Smart Phone Empowers Mobility-Impaired

Touch-Free Smart Phone Empowers Mobility-Impaired

Reuters - Innovations Video Online (Dec. 21, 2014) A touch-free phone developed in Israel enables the mobility-impaired to operate smart phones with just a movement of the head. Suzannah Butcher reports. Video provided by Reuters
Powered by NewsLook.com
Building Google Into Cars

Building Google Into Cars

Reuters - Business Video Online (Dec. 19, 2014) Google's next Android version could become the standard that'll power your vehicle's entertainment and navigation features, Reuters has learned. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com
After Sony Hack, What's Next?

After Sony Hack, What's Next?

Reuters - US Online Video (Dec. 19, 2014) The hacking attack on Sony Pictures has U.S. government officials weighing their response to the cyber-attack. Linda So reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins