|
Message-ID: <Pine.GSO.4.51.0808041304400.23930@faron.mitre.org> Date: Mon, 4 Aug 2008 13:08:01 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: Thijs Kinkhorst <thijs@...ian.org> cc: oss-security@...ts.openwall.com, "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: source for CVE feed (was: Re: CVE request: httrack buffer overflow) On Mon, 4 Aug 2008, Thijs Kinkhorst wrote: > Considering your statement we would better be using one of the XML Data feeds > from http://nvd.nist.gov/download.cfm , right? Or would you recommend another > feed (e.g. the one where NVD gets its data from)? NVD's XML data feed is probably the best out there that's publicly available. Representatives of CVE-compatible product authors, vulnerability databases, and software vendors can get direct access to an email-based feed from MITRE, which is the feed that NVD uses. MITRE hasn't opened this to the general public because most people would use it like a database, and we don't want to compete with other feeds out there. Guess that's kind of silly these days given that NVD turns it around in 5 minutes, but there it is. - Steve
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.