Feeling vulnerable? Talk about it

National Vulnerability Database

Related Links

Red Hat and the National Institute of Standards and Technology are working together to create a new commenting system for NIST's National Vulnerability Database (NVD).

The system will give vendors a forum to publicly contribute information about common vulnerabilities or those that may affect software or applications beyond the scope of their targets.

“We've been brainstorming this for a couple of years trying to figure out how to do it,” said Mark Cox, manager of Red Hat’s security response team. Cox is one of the founders of the commenting system.

Red Hat has been using the system as a test program for the past few weeks, submitting more than 100 comments. Only one other company, Linux developer Mandriva, has added a comment about its software.

No other system like NVD exists in the vendor community, Cox said. Although there are many major vulnerability databases, minor software-centric vulnerabilities often fly under the radar, he said. Most times, users must call companies to find out if certain vulnerabilities affected multiple programs.

“I saw use of it where multiple vendors ship the same software,” Cox said. “If it's an Apache vulnerability, then how does that affect Red Hat?”

Peter Mell, program manager for NVD, said NIST’s primary concern is to provide vendors and security companies a chance to comment.

There was “no way for the security industry to put their two cents in with respect to what these vulnerabilities mean,” Mell said.


  • FCW Perspectives
    tech process (pkproject/Shutterstock.com)

    Understanding the obstacles to automation

    As RPA moves from buzzword to practical applications, agency leaders say it’s forcing broader discussions about business operations

  • Federal 100 Awards
    Federal 100 logo

    Fed 100 nominations are now open

    Help us identify this year's outstanding individuals in federal IT.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.