From owner-freebsd-questions@FreeBSD.ORG Thu May 3 12:38:47 2007 Return-Path: X-Original-To: freebsd-questions@FreeBSD.org Delivered-To: freebsd-questions@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 2B70F16A402 for ; Thu, 3 May 2007 12:38:47 +0000 (UTC) (envelope-from wmoran@potentialtech.com) Received: from mail.potentialtech.com (internet.potentialtech.com [66.167.251.6]) by mx1.freebsd.org (Postfix) with ESMTP id F319113C465 for ; Thu, 3 May 2007 12:38:46 +0000 (UTC) (envelope-from wmoran@potentialtech.com) Received: from vanquish.pgh.priv.collaborativefusion.com (pr40.pitbpa0.pub.collaborativefusion.com [206.210.89.202]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.potentialtech.com (Postfix) with ESMTP id 1C692EBC78; Thu, 3 May 2007 08:38:46 -0400 (EDT) Date: Thu, 3 May 2007 08:38:45 -0400 From: Bill Moran To: "darshan na" Message-Id: <20070503083845.52414031.wmoran@potentialtech.com> In-Reply-To: <387cde1b0705030455p39566970uf40663721eabaeea@mail.gmail.com> References: <387cde1b0705030455p39566970uf40663721eabaeea@mail.gmail.com> X-Mailer: Sylpheed 2.3.1 (GTK+ 2.10.11; i386-portbld-freebsd6.1) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: freebsd-questions@FreeBSD.org Subject: Re: Hello :Regarding the vulnerability X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 May 2007 12:38:47 -0000 In response to "darshan na" : > Hi , > I am student at one of the German Universtiy and i had a task of > Benchmarking the Vulenrability Providers based on the features they provide > and ,its really nice that you provide vulnerablity information in xml format > and this is really very useful to parse this information for analysis > i was checking your website where advisiories are present and i could not > find any risk level alloted to the vulnerability > It is difficult to analyse them without that , I just wanted to know is > there any particular reason for this Did you miss section III (called "Impact") that appears in every Advisory? -- Bill Moran http://www.potentialtech.com