Skip to main content

Vulnerability naming schemes and description languages: CVE, Bugtraq, AVDL and VulnXML

Administrators and security experts are usually flooded with attack and vulnerability information, generated by the different security products like Firewalls, Intrusion Detection systems and Vulnerability Assessment tools. To react in a timely manner it is essential that these tools are naming events in a common way. The today's de facto standards CVE (Common Vulnerability Exposures) and the SecurityFocus Bugtraq database will be presented. CVE and Bugtraq have some limitations, they do not describe the vulnerability in enough detail and a common format. These limitations inspired two new proposals: AVDL (Application Vulnerability Description Language) and VulnXML. With them it will be possible to directly import a describing XML document into a scanning tool and the tool will generate and launch the vulnerability scan. AVDL and VulnXML will be described and discussed in this paper.

1058 (PDF, 1.70MB)

30 May 2003
ByMichael Rohse
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

A New Era in Vulnerability Management: A SANS Review of the Seemplicity Platform

Research Paper

In this paper, Dave Shackleford offers an inside look at Seemplicity, a vendor-agnostic remediation orchestration platform designed to unify vulnerability management across code, cloud, and infrastructure.

  • 18 Aug 2025
  • Dave Shackleford

Adopting an Offensive Security Posture: Strategies and Best Practices

Research Paper

This paper delves into essential concepts, and offers practical guidance for adopting an offensive security posture.

  • 18 Aug 2025
  • Jorge Orchilles

Enhanced Decisions with WatsonX: A Look at IBM QRadar Investigation Assistant

Research Paper

This paper examines IBM QRadar Investigation Assistant, an AI-powered tool that enhances SOC performance by streamlining incident triage, automating threat enrichment, and enabling natural language query capabilities.

  • 6 Aug 2025
  • Matt Bromiley

Balancing On-Prem and Cloud Security Strategic Considerations for Modern Organizations

Research Paper

This paper examines the strategic trade-offs between cloud and on-prem deployments, and the growing trend of consolidating tools into integrated security platforms.

  • 30 Jul 2025
  • Matt Bromiley

Evaluating Zero Trust Network Access: A Framework for Comparative Security Testing

Research Paper

While most evaluations rely on vendor checklists and surface-level comparisons, this white paper takes a different approach: building and applying a hands-on testing framework grounded in NIST SP 800-207 and the CISA Zero Trust Maturity Model.

  • 11 Jul 2025

Malware Function-based encryption technique

Research Paper

Recent malware often uses techniques to evade detection by cybersecurity products. One of the...

  • 22 Jun 2022

Detecting Unauthorized Behavior From Legitimate Accounts

Research Paper

Incident Responders face an almost insurmountable amount of log events, and the move to the Cloud...

  • 22 Jun 2022

Recover an RSA Private Key from a TLS v1.2 session

Research Paper

Cyberattacks happen every day.Most organizations have administrative and technical controls...

  • 22 Jun 2022

Cyber Guardian Exercise: A Case Study in Brazil to Address Challenges in Cybersecurity and Protect Critical Infrastructure

Research Paper

Discussions of cybersecurity, in particular those associated with critical infrastructure (CI),...

  • 22 Feb 2022

Recommendations for small/medium-sized businesses enabling incident response

Research Paper

Security incidents are inevitable. While large businesses can afford security teams to prepare and...

  • 17 Jan 2022

Black-Box Fuzzing for Android Native Libraries

Research Paper

Many Android application developers are adopting C\C++ native language development in their Android...

  • 12 Jan 2022

Machine Learning Techniques for Intrusion Detection

Research Paper

This paper aims to equip intrusion analysts with the basic techniques needed to apply machine...

  • 9 Jun 2021

Detecting DLL Search Order Hijacking: How using a purple team approach can help create better defensive techniques and a more tactical SIEM

Research Paper

Many SIEM analysts will recognize the feeling of being overwhelmed with security logs and alerts,...

  • 4 May 2020

Corporate Information Governance with Business Wisdom

Research Paper

Whether a secret ingredient used for a lemonade stand across the street or the business strategies...

  • 4 May 2020

Automated Detection and Disinfection of Ransomware Attacks using Roadblock Software

Research Paper

We often hear about ransomware locking data and demanding the ransom. Ransomware is a kind of...

  • 18 Mar 2020

Assisted Security Investigations Using Cognitive Computing

Research Paper

The purpose of this research is to illustrate the application of cognitive computing and machine...

  • 3 Dec 2019

Leveraging the PE Rich Header for Static Malware Detection and Linking

Research Paper

An ever-increasing number of malware samples are identified and assessed daily. Malware researchers...

  • 1 Jul 2019

Analysis of a Multi-Architecture SSH Linux Backdoor

Research Paper

A key aspect in any intrusion is to attempt to gain persistence on the compromised system. Threat...

  • 17 Jun 2019

Unpacking and Decrypting FlawedAmmyy

Research Paper

Malware authors commonly utilize packers (Roccia, 2017) as a method of concealing functionality and...

  • 22 Apr 2019

Continuous Security Monitoring in non-Active Directory Environments

Research Paper

Active Directory-centric monitoring techniques, tools, and methodologies have dominated information...

  • 20 Feb 2019

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.