VulDB
  • Dom
    • Przegląd
    • Live Recent
    • Live Updates
    • Live Archive
    • Live Commits
    • Live Submits
  • Wpisy
    • Niedawny
    • Aktualizacje
    • Commits
    • Archiwum
    • CNA
    • Statystyka
    • Przesyła
    • Zatwierdź
  • Produkty
    • Sprzedawca
    • Produkt
    • Rodzaj
  • Ryzyko
    • CVSS v4
    • CVSS v3
    • CVSS v2
    • Ryzyko
    • Exploity
    • KEV
  • Zagrożenie
    • Analiza
    • Zajęcia
    • Wydarzenia
    • Aktorzy
    • Adresy IP
    • Kraj
    • Sektor
    • Wykorzystaj cenę dzisiaj
  • Referencje
    • Referencje
    • CWE
    • Przybory
    • Filmy
    • Hacking Google
    • Eksport
  • Poszukiwanie
    • Poszukiwanie
    • zaawansowane wyszukiwanie
    • Użytkownik
    • Kanały
    • API
  • Wsparcie
    • Dokumentacja
    • FAQ
    • Lista zmian
    • Mapa drogowy
    • Status
    • Kontakt
  • Zaloguj sie
    • Zaloguj sie
    • Zapisz się
    • Zakup
    • Warunki użytkowania
  • Dokumentacja
  • FAQ
  • Warunki korzystania
  • Alertowanie
  • API
  • Ochronie danych
  • Wsparcie
Zaloguj sieZapisz się
🛡 DomDokumentacja
Data Feed

Data Feed

VulDB provides a centralized platform to aggregate and use of vulnerability data. Multiple vulnerability data feeds are available to establish an efficient and professional high-quality vulnerability management. Some of them are:

  • Web Service
  • API Endpoint
  • RSS Feeds
  • Mail Alert
  • Splunk App
  • Nmap NSE Script
  • Alexa Skill

Aktualizacje: 2024-04-13 przez VulDB Documentation Team

Do you know our Splunk app?

Download it now for free!

◂ PoprzedniPrzeglądKolejny ▸

Dokumentacja

A

  • A.I.
  • ADP
  • ANID
  • API
  • API Credits📌
  • API Fields
  • API Key
  • API Requests
  • ATT&CK
  • About📌
  • Abuse
  • Account Number
  • Account Sharing
  • Accounts
  • Activity Benefits
  • Activity Index
  • Activity Scores
  • Address
  • Advance Payment
  • Advanced User
  • Alerting
  • Alexa Skill
  • Amazon Echo
  • Ancient Vulnerability Data
  • Anonymous User
  • Archive
  • Artificial Intelligence
  • Attack Identification
  • Authorized Data Publisher
  • Automation
  • Availability
  • Awards

B

  • BCM
  • BIA
  • BIC
  • BPA
  • Bank Details
  • Banking
  • Best-of-Breed
  • Better Price
  • Billing Cycle
  • Blacklisting
  • Bug Bounty
  • Bugbase
  • Bugbounty Payout Price
  • Burden
  • Business Continuity Management
  • Business Identification Number
  • Business Impact Analysis
  • Business Name Index
  • Business Process Automation
  • Buy

C

  • C3BM
  • CCPA
  • CERT
  • CH
  • CISA
  • CISA Funding Problems
  • CISA KEV
  • CNA📌
  • CNA Rules
  • CNA Story
  • COOP
  • CPE📌
  • CRA
  • CSV
  • CTI
  • CTI API
  • CVE
  • CVE Cooperation
  • CVE Coverage
  • CVE Dispute
  • CVE Funding Problems
  • CVE Numbering Authority
  • CVE Rejected
  • CVE Reserved
  • CVE Revoked
  • CVMAP
  • CVSS
  • CVSS Confidence
  • CVSSv3 Base Meta Index
  • California Consumer Privacy Act
  • Certainty
  • Certifications
  • Certified Vulnerability Manager
  • Certified Vulnerability Researcher
  • Challenge Entry
  • Change Index
  • Change Pointer
  • Changelog📌
  • Changes
  • Chargeback
  • Child Labor
  • Code of Conduct
  • Collaborative Vulnerability Metadata Acceptance Process
  • Commercial Register
  • Commercial Software
  • Commit Confidence
  • Commits
  • Common Platform Enumeration
  • Common Vulnerabilities and Exposures
  • Common Vulnerability Scoring System📌
  • Community
  • Community Support
  • Company History
  • Competent User
  • Confidence
  • Consumer Key
  • Contact
  • Continuity of Operations Planning
  • Contract Basis
  • Coordinated Disclosure
  • Cortana
  • Cost
  • Countermeasures
  • Coverage📌
  • Credit Card
  • Crisis Management
  • Critical Infrastructure
  • Criticality
  • Custom Alerts
  • Custom Filter
  • Custom Notification
  • Cyber Defense Agency
  • Cyber Resilience Act
  • Cyber Threat Intelligence📌

D

  • DORA
  • DRP
  • DSGVO
  • Darknet Monitoring
  • Data Feed
  • Data Points📌
  • Data Privacy Notice
  • Data Protection
  • Data Revocation
  • Data Suppression
  • Datenschutz-Grundverordnung
  • Defunct Source
  • Delete Entry
  • Demo
  • Deny
  • Depublished Products
  • Digital Operational Resilience Act
  • Disaster Recovery
  • Discounts
  • Display Problems
  • Dispute
  • Distribution Handling
  • Duplicates

E

  • EOL
  • EPSS
  • EU Cyber Resilience Act
  • Early Vulnerabilities
  • Embargo Policy
  • Employees
  • End-of-Life
  • End-of-Service
  • European Cyber Resilience Act
  • Evaluation📌
  • Excel
  • Expert
  • Exploit Prediction Scoring System
  • Exploit Prices
  • Exploitability📌
  • Exploited in-the-wild
  • Export
  • Extended Work

F

  • FADP
  • FAQ📌
  • FIRST
  • Facebook
  • Fair Pricing
  • Fairness
  • Fake Data
  • False-Positives
  • Feed
  • Fields
  • Filter
  • Flaw
  • Forced Work
  • Forecasts
  • Fraud
  • Free Features
  • Freeware

G

  • GCVE
  • GCVE Numbering Authority
  • GDPR
  • GNA
  • GNU
  • GRN
  • General Data Protection Regulation
  • GitHub
  • Global CVE Allocation System
  • Global Reseller Network
  • Grand Master
  • Guru

H

  • Health Insurance
  • Hidden Activities
  • High
  • High Priority
  • High-Availability
  • Historical Vulnerability Data
  • History

I

  • IBAN
  • ICS
  • ICSMA
  • ILO
  • IOA
  • IOC
  • ISMS
  • ISO 27001
  • ISO 27002
  • ISO 27017
  • ISO 29147
  • ISO Coverage
  • ISOC
  • Identifier Collision
  • Inaccurate Data
  • Index Location
  • Indicator of Attack
  • Indicator of Compromise
  • Information Security Management System
  • Information Security Operations Center
  • Infrastructure Security
  • Internal Testing
  • Invoice Data
  • Invoicing

J

  • JSON

K

  • KEV
  • Known Exploited Vulnerabilities

L

  • Labor Act
  • Legal
  • Legal Disclosure
  • Legal Notice
  • License
  • Lifecycle
  • Limiting
  • Link Rot
  • Linux Coverage
  • Local Distributor
  • Logo
  • London
  • Low

M

  • MITRE
  • MITRE Cooperation
  • MITRE Funding Problems
  • MTPD
  • MWST
  • MWST
  • Made in Switzerland
  • Mail Alert
  • Mark::Zero
  • Market Analysis
  • Master
  • Maternity Leave
  • Maximum Tolerable Period of Disruption
  • Medium
  • Mehrwertsteuer
  • Mehrwertsteuer
  • Merging
  • Minimum Runtime
  • Mitigations
  • Moderation
  • Moderation Confidence
  • Multiple Users
  • MyFilter

N

  • NIAC
  • NIS-2
  • NIST
  • NVD📌
  • NVD Cooperation
  • NVD Funding Problems
  • National Infrastructure Advisory Council
  • National Institute of Standards and Technology
  • National Vulnerability Database
  • Net 30
  • Net 60
  • New York
  • No Vendor Response
  • Not supported anymore
  • Novice

O

  • Offer
  • Old Vulnerabilities
  • Onboarding📌
  • Online Presence
  • Open-source
  • Order
  • Outdated Products
  • Outdated Software
  • Outlook Problems

P

  • PCI DSS
  • PO
  • POC
  • Package Handling
  • Passive User
  • Patch
  • Pay
  • Payment Data
  • Payment Due Date
  • Payment Methods
  • Payout Price
  • Plan
  • Pointer Position
  • Points
  • Pre-defined Filter
  • Predictions
  • Prepayment
  • Pricing
  • Prior to X
  • Prioritize
  • Priority Metrics
  • Privacy Law
  • Privacy Legislation
  • Processing📌
  • Product Dictionary
  • Product Filter
  • Product Identifier
  • Proficient User
  • Proof of Concept
  • Purchase
  • Purchase Order
  • Purl
  • Pyxyp

Q

  • QA
  • Quality
  • Quality Assurance
  • Queue
  • Quote

R

  • RTO
  • Ranks
  • Reaction Time
  • Recommended Credits
  • Recovery Time Objective
  • Reddot:Zero
  • Redundancy
  • Refund Policy
  • Reject
  • Reports
  • Reseller
  • Resilience
  • Responsible Disclosure
  • Revoke
  • Risk
  • Risk Assessment
  • Risk Level
  • Risk Metrics
  • Roadmap

S

  • SAP Business Network
  • SLA
  • SOC Connectivity
  • Security Bug
  • Security Issue
  • Security Operations Center
  • Semantic Versioning
  • Senior Expert
  • Senior Master
  • Service History
  • Service Level Agreement
  • Shareware
  • Siri
  • Slavery Act
  • Smart Home
  • Social Media
  • Software License
  • Software Version
  • Solutions
  • Sources📌
  • Sovereignty
  • Splitting
  • Splunk App
  • Splunk Index
  • Splunk Pointer
  • Standards
  • Statements
  • Statistical Data
  • Stripe
  • Structured Data
  • Submission Policy📌
  • Subscription📌
  • Superguru
  • Supplier Onboarding
  • Support
  • Swissness
  • Switzerland

T

  • TIBER-EU
  • TIN
  • TIP
  • TLPT
  • TOS
  • TTP
  • Tax Identification Number
  • Taxes
  • Templates
  • Terms of Use📌
  • Threat Intelligence Platform
  • Threatintel
  • Throttling
  • Timelines
  • Trademark
  • Triggers
  • Twitter

U

  • UID
  • Unavailable Source
  • Unsupported Products
  • Unsupported Software
  • Up to X
  • Updates
  • Upfront Payment
  • Upgrade
  • Urgent
  • User
  • Users

V

  • VAT
  • VCVC
  • VCVM
  • VCVR
  • Value-added Tax
  • Vendor Dictionary
  • Vendor Identifier
  • Vendor Onboarding
  • Version Handling
  • Video Tutorials
  • Virtual Fields
  • Voluntary Work
  • VulDB
  • VulnDB
  • Vulnerability📌
  • Vulnerability API
  • Vulnerability Alert
  • Vulnerability Data Feed
  • Vulnerability Disclosure
  • Vulnerability Entry Confidence
  • Vulnerability Historian
  • Vulnerability Management
  • Vulnerability Moderation
  • Vulnerability Notification
  • Vulnerability Prioritization
  • Vulnerability Processing
  • Vulnerability Revocation
  • Vulnerablity Dispute

W

  • Weak CVE
  • Weak Submission
  • Weakness
  • What is a Vulnerability
  • Whitepaper📌
  • Why VulDB
  • Workaround
  • Working with Vendors
  • Wrong Data

X

  • XML

Z

  • ZH
  • Zeroday Processing
  • Zurich
© 1997-2025 vuldb.com · cc by-nc-sa
en · de · fr · it · es · pt · ru · sv · zh · ja · ar
v18.26.1