itsecdb.com itsecdb.com

itsecdb.com

IT Security Database. OVAL patch, vulnerability, compliance definitions data source

IT Security Database. Patch, vulnerability, compliance data source. OVAL, open vulnerability and assessment language definitions from NIST, Mitre, Red Hat, Suse, Apache and others.

http://www.itsecdb.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR ITSECDB.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

August

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Thursday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.1 out of 5 with 14 reviews
5 star
8
4 star
1
3 star
4
2 star
0
1 star
1

Hey there! Start your review of itsecdb.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.1 seconds

FAVICON PREVIEW

  • itsecdb.com

    16x16

  • itsecdb.com

    32x32

  • itsecdb.com

    64x64

  • itsecdb.com

    128x128

CONTACTS AT ITSECDB.COM

SERKAN OZKAN

levent●●●●●●siktas

ist●●●bul , 34000

Turkey

90.90●●●●●23011
so●●●●●●●@yahoo.com

View this contact

SERKAN OZKAN

levent●●●●●●siktas

ist●●●bul , 34000

Turkey

90.90●●●●●23011
so●●●●●●●@yahoo.com

View this contact

SERKAN OZKAN

levent●●●●●●siktas

ist●●●bul , 34000

Turkey

90.90●●●●●23011
so●●●●●●●@yahoo.com

View this contact

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

DOMAIN REGISTRATION INFORMATION

REGISTERED
2010 July 22
UPDATED
2014 July 07
EXPIRATION
EXPIRED REGISTER THIS DOMAIN

BUY YOUR DOMAIN

Network Solutions®

DOMAIN AGE

  • 14

    YEARS

  • 9

    MONTHS

  • 28

    DAYS

NAME SERVERS

1
ns25.domaincontrol.com
2
ns26.domaincontrol.com

REGISTRAR

GODADDY.COM, LLC

GODADDY.COM, LLC

WHOIS : whois.godaddy.com

REFERRED : http://registrar.godaddy.com

CONTENT

SCORE

6.2

PAGE TITLE
IT Security Database. OVAL patch, vulnerability, compliance definitions data source | itsecdb.com Reviews
<META>
DESCRIPTION
IT Security Database. Patch, vulnerability, compliance data source. OVAL, open vulnerability and assessment language definitions from NIST, Mitre, Red Hat, Suse, Apache and others.
<META>
KEYWORDS
1 security
2 cve
3 nvd
4 oval
5 open vulnerability and assessment language
6 usgcb
7 fdcc
8 national vulnerability database
9 exploit
10 advisory
CONTENT
Page content here
KEYWORDS ON
PAGE
cve vulnerability database,browse,oval objects,oval sources,by release dates,oval definitions,windows,compliance,inventory,patches,vulnerabilities,unix/linux,red hat advisories,suse linux advisories,pixos,oval classes,miscellaneous,patch,vulnerability
SERVER
Apache/2.4.25 (Amazon) OpenSSL/1.0.1k-fips PHP/5.4.45
POWERED BY
PHP/5.4.45
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

IT Security Database. OVAL patch, vulnerability, compliance definitions data source | itsecdb.com Reviews

https://itsecdb.com

IT Security Database. Patch, vulnerability, compliance data source. OVAL, open vulnerability and assessment language definitions from NIST, Mitre, Red Hat, Suse, Apache and others.

INTERNAL PAGES

itsecdb.com itsecdb.com
1

OVAL definitions, vulnerabilities and patches by release dates

http://www.itsecdb.com/oval/browse-bydate.php

Vulnerabilities By Release Dates. Some of the data sources do not provide date information, so the list may not be complete if you browse by dates. Vulnerabilities By Last Update Dates. Some of the data sources do not provide date information, so the list may not be complete if you browse by dates. Patches By Release Dates. Some of the data sources do not provide date information, so the list may not be complete if you browse by dates. OVAL Definitions By Referenced Objects. How does it work?

2

Windows Access Token Objects Used By OVAL Definitions

http://www.itsecdb.com/oval/objects/windows/accesstoken/security-principle

Windows Access Token Objects Used By OVAL Definitions. Total number of results : 19. OVAL Definitions By Referenced Objects. How does it work? User agreement and privacy statement. CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site.

3

OVAL definition sources:Mitre,Red Hat,NIST and more

http://www.itsecdb.com/oval/oval-sources-index.php

Definitions By OVAL Source Repositories:. Official OVAL repository from oval.mitre.org http:/ oval.mitre.org/rep-data/org.mitre.oval/index.html. Red Hat Security Advisories. Security advisory data published by RedHat, http:/ www.redhat.com/security/data/oval/. Please visit http:/ www.redhat.com/security/transparent/oval/ for more details. Suse Linux Security Advisories. Suse Linux security advisory data published by Novell, http:/ support.novell.com/security/oval/. SCAP Content for Windows Vista. USGCB W...

4

OVAL Definitions : Class: Compliance

http://www.itsecdb.com/oval/definitions/class-1-Compliance

OVAL Definitions - Class: Compliance. Passwords Stored Using Reversible Encryption. Passwords Stored Using Reversible Encryption. Passwords Stored Using Reversible Encryption. Oval:gov.nist.usgcb.windowsseven:def:214. 83 Style Filenames Not Generated. 83 Style Filenames Not Generated. 83 Style Filenames Not Generated. Oval:gov.nist.fdcc.xp:def:119. Accept Only 1st Party Cookies. Access Audit for Global System Objects Disabled. Oval:gov.nist.fdcc.xp:def:45. Access Audit for Global System Objects Disabled.

5

OVAL Definitions : Source: Suse Linux Security Advisories

http://www.itsecdb.com/oval/definitions/source-oval:org.opensuse

OVAL Definitions - Source: Suse Linux Security Advisories. Total number of results : 4091. OVAL Definitions By Referenced Objects. How does it work? User agreement and privacy statement. CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site.

UPGRADE TO PREMIUM TO VIEW 15 MORE

TOTAL PAGES IN THIS WEBSITE

20

LINKS TO THIS WEBSITE

cvedetails.com cvedetails.com

CVSS Score Distribution For Top 50 Products By Total Number Of Distinct Vulnerabilities

http://www.cvedetails.com/top-50-product-cvssscore-distribution.php

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). CVSS Score Distribution For Top 50 Products By Total Number Of Distinct Vulnerabilities. Number of Total Vulnerabilities. Mac Os X Server. Products(s) with highest weighted average (9.60): Adobe AIR. Weighted average = SUM( Cvss Range (e.g: 2 for range 1-2 ). How does it work? Known limitations and technical details.

cvedetails.com cvedetails.com

Adobe Flash Player : List of security vulnerabilities

http://www.cvedetails.com/vulnerability-list/vendor_id-53/product_id-6761/Adobe-Flash-Player.html

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). Raquo; Flash Player. CVSS Scores Greater Than: 0. Sort Results By : CVE Number Descending. Number Of Exploits Descending. Press ESC to close. DoS Exec Code Overflow Mem. Corr. DoS Exec Code Overflow Mem. Corr. DoS Exec Code Overflow Mem. Corr. DoS Exec Code Overflow Mem. Corr. DoS Exec Code Overflow Mem. Corr. DoS Exec Code ...

cvedetails.com cvedetails.com

CVE terminology and information

http://www.cvedetails.com/cve-help.php

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). CVE Terminology and FAQ. What is a Vulnerability? An information security "vulnerability" is a mistake in software that can be directly used by a hacker to gain access to a system or network. What is an Exposure? What is a CVE Identifier? CVE identifier number (i.e., "CVE-1999-0067"). CVE Identifiers are used by information ...

cvedetails.com cvedetails.com

List of products

http://www.cvedetails.com/product-list.php

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). Browse product names starting with:. A Better Member-based Asp Photo Gallery. A King Sperm By Dr. Seema Rao. A Very Short History Of Japan. A Php Scripts News Management System. A-a-s Application Access Server. A-a-s Application Access Server. A-msr20-15 A Multi-service Router. A-msr20-15 Aw Multi-service Router. OVAL is a r...

cvedetails.com cvedetails.com

CVSS Score Distribution For Top 50 Vendors By Total Number Of Distinct Vulnerabilities

http://www.cvedetails.com/top-50-vendor-cvssscore-distribution.php

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). CVSS Score Distribution For Top 50 Vendors By Total Number Of Distinct Vulnerabilities. Number of Total Vulnerabilities. Vendor(s) with highest weighted average (9.10): Adobe. Weighted average = SUM( Cvss Range (e.g: 2 for range 1-2 ). Number of vulnerabilities in that range) / (Total number of vulnerabilities).

cvedetails.com cvedetails.com

List of software vendors

http://www.cvedetails.com/vendor.php

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). Browse vendor names starting with:. A-a-s Application Access Server. Ab Google Map Travel Project. Total number of vendors found = 1229 Page : 1. How does it work? Known limitations and technical details. User agreement, disclaimer and privacy statement.

cvedetails.com cvedetails.com

CVE security vulnerability database. Security vulnerabilities, exploits, references and more

http://www.cvedetails.com/index.php

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). You can generate a custom RSS feed or an embedable vulnerability list widget or a json API call url. Selected vulnerability types are OR'ed. If you don't select any criteria all CVE entries will be returned. Cross Site Request Forgery. CVSS score = :. Copy the code below and add it to your web page :. Vulnerabilities are cla...

cvedetails.com cvedetails.com

Browse cve vulnerabilities by date

http://www.cvedetails.com/browse-by-date.php

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). Browse Vulnerabilities By Date. Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.). How does it work? Known limitations and technical details.

cvedetails.com cvedetails.com

CVE security vulnerability database. Security vulnerabilities, exploits, references and more

http://www.cvedetails.com/cve/2013-7091

Eg: CVE-2009-1234 or 2010-1234 or 20101234). Vulnerability Feeds and Widgets. Eg: CVE-2009-1234 or 2010-1234 or 20101234). Search By Microsoft Reference ID:. Eg: ms10-001 or 979352). This site only contains valid CVE entries. Rejected or reserved CVE entries are not included in our database. Please visit http:/ cve.mitre.org. And nvd.nist.gov. If you think that the CVE entry is missing in our database. How does it work? Known limitations and technical details.

UPGRADE TO PREMIUM TO VIEW 33 MORE

TOTAL LINKS TO THIS WEBSITE

42

OTHER SITES

itseccity.com itseccity.com

Das Magazin für alle IT-Security-Themen

Compliance / GRC - Produkte and Services. Unternehmen, Organisationen, Verbände. Intrusion Detection and Prevention. Router / Switches / Security Appliances. Sicherheitsplattformen and Lösungspakete. Helpdesk, Support und IT Services. System-, Netzwerk-, Datenbank-, Softwaremanagement. Compliance mit der EU-Datenschutz-Grundverordnung. IT-Sicherheit im Kontext von Compliance. Lösungen and Services. Archiv 2014 - 2017. Okt - Dez. 2017. Jul - Sep. 2017. Apr - Jun. 2017. Jan - Mär. 2017. Okt - Dez. 2016.

itseccity.de itseccity.de

Das Magazin für alle IT-Security-Themen

Compliance / GRC - Produkte and Services. Unternehmen, Organisationen, Verbände. Intrusion Detection and Prevention. Router / Switches / Security Appliances. Sicherheitsplattformen and Lösungspakete. Helpdesk, Support und IT Services. System-, Netzwerk-, Datenbank-, Softwaremanagement. Compliance mit der EU-Datenschutz-Grundverordnung. IT-Sicherheit im Kontext von Compliance. Lösungen and Services. Archiv 2014 - 2017. Okt - Dez. 2017. Jul - Sep. 2017. Apr - Jun. 2017. Jan - Mär. 2017. Okt - Dez. 2016.

itseccity.net itseccity.net

Das Magazin für alle IT-Security-Themen

IT SecCity alt: 2002 bis 2013. IT SecCity alt: 2002 bis 2013. IT Security / Safety-Shop. Kontakt: Pressemitteilungen und Anzeigenabteilung. Wichtiger Hinweis zu Rechtsthemen. RSS: IT SecCity-News Feed abonnieren. Sitemap von IT SecCity.de. Das Magazin für alle IT-Security-Themen. Neues von der Malware-Front. 100815 - IT Security-Telegramm. 100815 - Schutz gegen Spear-Phishing mit eingebetteten schädlichen URLs. 100815 - Tipps: Wie können Mitarbeiter zur IT-Sicherheit im Unternehmen beitragen? Die Corpora...

itseccity.org itseccity.org

Das Magazin für alle IT-Security-Themen

IT SecCity alt: 2002 bis 2013. IT SecCity alt: 2002 bis 2013. IT Security / Safety-Shop. Kontakt: Pressemitteilungen und Anzeigenabteilung. Wichtiger Hinweis zu Rechtsthemen. RSS: IT SecCity-News Feed abonnieren. Sitemap von IT SecCity.de. Das Magazin für alle IT-Security-Themen. Neues von der Malware-Front. 100815 - IT Security-Telegramm. 100815 - Schutz gegen Spear-Phishing mit eingebetteten schädlichen URLs. 100815 - Tipps: Wie können Mitarbeiter zur IT-Sicherheit im Unternehmen beitragen? Die Corpora...

itsecconsultancy.com itsecconsultancy.com

ITSEC Consultancy

Your Partner In Business. To change the World. We provide professional consulting service in most major sectors. Our professional consultants have years of experiences and will help you to maximize the value of your business infrastructure. We have access to the best minds on any subject in the business economy, and the in-house expertise to turn their input into effective and insightful analysis. IT Security and Electrical. Fiber and Copper Cabling. Welcome to Our Company! Our process is guided by real ...

itsecdb.com itsecdb.com

IT Security Database. OVAL patch, vulnerability, compliance definitions data source

What is this site? This site collects OVAL(Open Vulnerability and Assessment Language) definitions from several sources. Like Mitre, Red Hat, Suse, NVD, Apache etc and provides a unified, easy to use web interface to all IT security related items including patches, vulnerabilities and compliance checklists. Itsecdb is fully integrated to www.cvedetails.com. You can also browse or search for items used in oval definitions like file names, rpm packages, AIX patch numbers etc, so you can easily find all pat...

itsecdev.com itsecdev.com

IT SecDev Corporation

itsecdev.net itsecdev.net

IT SecDev Corporation

itsecdev.org itsecdev.org

IT SecDev Corporation

itsecdom.blogspot.com itsecdom.blogspot.com

Noticias de Seguridad TI

Noticias de Seguridad TI. Temas de Seguridad y Tecnología. Cómo los Hackers obtienen su Información Personal. De acuerdo con un estudio realizado por Javelin Strategy and Research, los hackers hicieron más de $21 millones de dólares de más de 12,6 millones de víctimas en 2012. Los hackers obtienen su información personal de muchas maneras diferentes. Sin embargo, aquí están algunas de las formas más comunes que pueden hackear su cuenta personal. 1 A través de contraseñas. Muchos sitios web de venta tendr...

itseceye.com itseceye.com

itseceye.com

Ce nom de domaine n'est pas disponible. Il a été enregistré via gandi.net. More information about the owner. Enregistrer votre nom de domaine. Chez Gandi, vous avez le choix sur plus d'une centaine d'extensions et vous bénéficiez de tous les services inclus (mail, redirection, ssl.). Rechercher un nom de domaine. Votre site dans le cloud? Découvrez Simple Hosting, notre cloud en mode PaaS à partir de 4 HT par mois (-50% la première année pour les clients domaine). It is currently being parked by the owner.