Product Watch: eEye Revives Free Zero-Day Vulnerability Tracker Site
Aims to be a 'one-stop shop' for zero-day vulnerabilities, analysis
September 22, 2010
eEye Digital Security founder Marc Maiffret's recent return to the company was capped off today with the rerelease of an updated version of the security firm's freebie zero-day vulnerability disclosure and analysis service he once spearheaded.
The new Zero Day Tracker contains the latest zero-day vulnerabilities and analysis on each one -- including some being reported by eEye researchers -- and ways to mitigate and protect against attacks using these bugs. "We're trying to be more of a zero-day historian, if you will. We'll keep track of something we've seen or ZDI [or others] have done," Maiffret says. "This is a completely free public resource."
eEye's previous zero-day tracker page was out at a time when zero-day vulnerabilities weren't the predominant bugs being used in real-world attacks, he says. "We're seeing more commonly that zero-day vulnerabilities are now being used and in more widespread attacks. So we decided it was important to bring [the tracker service] back because it's even more relevant now," Maiffret says. "Organizations can come to the site and see a list of what's out there and how it might affect their business.
"Our goal is to be a one-stop shop page to see the status of all current zero-days," he says. "This is a resource for IT folks to see what the threat landscape looks like ... and making sure we keep pressure on software companies" to fix their vulnerabilities, he says.
eEye will include unpatched bugs on the site, and the bugs it discloses won't include details on how to exploit them until a patch is released, he says.
Maiffret says there's almost always a zero-day bug out there affecting the majority of Web application configurations. "The reality is that it doesn't matter how or when a researcher releases a zero-day," he says. "[It] doesn't dramatically change the threat landscape because there are five other better ones being used in the wild."
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024