vFeed Framework is a CVE, CWE and OVAL Compatible naming scheme concept that provides extra structured detailed third-party references and technical characteristics for a CVE entry through an extensible XML/JSON schema. It also improves the reliability of CVEs by providing a flexible and comprehensive vocabulary for describing the relationship with other standards and security references.
vFeed utilizes XML-based / JSON-based format outputs to describe in detail vulnerabilities. They can be leveraged as input by security researchers, practitioners and tools as part of their vulnerability description. In fact, the standard syntax is easy to interpret by humans and systems.
The associated vFeed.db (The Correlated Vulnerability and Threat Database) is a detective and preventive security information repository used for gathering vulnerability and mitigation data from scattered internet sources into an unified database.
-
Open security standards:
-
Vulnerability Assessment & Exploitation IDs (Metasploit, Saint Corporation, Nessus Scripts, Nmap, Exploit-DB, milw0rm)
-
Vendors Security Alerts:
- Microsoft MS
- Mandriva
- Redhat
- Cisco
- Sun
- Gentoo
- Ubuntu
- And more ...
- Registered as CVE, CWE and OVAL Compatible by the Mitre Corporation
- Built using open source technologies
- Rely on main Open Standards CVE, CPE, CWE, CAPEC, CVSS etc
- Downloadable SQLite Community Correlated Vulnerability and Threat Database
- New Structured XML format to describe vulnerability
- Support correlation with 3rd party security references IAVA, OSVDB, OVAL etc
- Support correlation with security assessment and patch vendors (Nessus, Exploit-DB, Redhat, Microsoft..)
- Simple and ready-to-use API Python methods
- Penetration testers who want to analyze CVEs and gather extra information to help shape avenues to exploit vulnerabilities.
- Security auditors who want to report accurate information about findings. vFeed could be the best way to describe a CVE with attributes based on standards and 3rd party references as vendors or companies involved into standarization efforts.
- Security tools vendors / security open source developers who need to implement libraries to enumerate useful information about CVEs without wasting time to correlate and to create a proprietary database. vFeed is by far the best solution. Methods can be invoked from programs or scripts with a simple call.
- Any security hacker who is conducting researches and need a very fast and accurate way to enumerate available exploits or techniques to check a vulnerability
Run vfeedcli.py -h for help.
Refer to the wiki page for a detailed documentation.
- Added support to Landscape with some code cleaning.
- Modified the
update.pyclass to display the vFeed License before downloading the database.
- Added the ability to migrate to Mongo Database (Thanks so much to Ushan89 for the original code)
- A new class
mongo.pyadded (based on Ushan89 code to simply the process of migration from SQLite to MongoDB- --migrate: Dump into a CSV then populate the vFeed MongoDB
- The documentation updated. Visit Documentation Page
See changelog for more details
