Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What process is used to enter vulnerabilities into the database?

0
Posted

What process is used to enter vulnerabilities into the database?

0

The primary way entries are entered into the database is from numerous security mailing lists. Once a vulnerability is determined to be valid it is then added to the database in a pending mode and prioritized to be reviewed and edited by an OSVDB data mangler.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123