Start your security journey by understanding your risks. You need to have a software AND hardware inventory to
properly defend your business from threats - as both hardware firmware and exploitble software can be exploited.
How to use:
Start by cataloging your most important software. Your web browser is one of these, and has automatically been included as an example.
Fill out as many of the columns as you can for each software. Hover over the column header for help on what to enter in it.
The most important columns SeeVE needs are Product Name, Type, Vendor, and Version. If there are issues such as typos, it will throw an error later.
Once you've entered some software, click the Search for vulnerabilities button. Any reported security flaws will be displayed below it.
If you see any critical vulnerabilities, you should take the latest patches or contact your vendor immediately.
Repeat the above process for your IT hardware (most importantly, networking equipment and hardware firewalls) and Open-source libraries used by your software/website teams.
Save your work by clicking any of the Export buttons. You can import any of these later to resume this exercise.
If this is too much information or you need help working through this, contact us!
You can save your progress at
any time by clicking the Export button, and load your file by selecting it and pressing Import.
This tool does NOT send any data to Data Pros Consulting, it is fully contained to your browser, the file you
export with this tool, and the API calls to the above datasources to look for vulnerabilities. Feel free to check
the code and network packets if you don't believe it.
Once you have your list completed, click this button to scan for vulnerabilities. The public databases can clear
roughly 50 API calls per minute, meaning if you've got hundreds of systems, treat yourself to a coffee while you
wait.
CVE and the CVE logo are registered trademarks of The MITRE Corporation. NVD web pages are provided as a public service by the National Institute of Standards and Technology (NIST).
Data Pros Consulting and SeeVE are not associated or affiliated with these entities.
SeeVE is a free tool to assist in cataloging organizational risk, and is not a security solution on its own. Data shown in the vulnerability scans is subject to user data entry accuracy against the aforementioned data sources and the quality of data in those sources, as documented by the respective vulnerability reporting authorities. Not all vulnerabilities may be found, and this tool alone is not sufficient for cybersecurity risk management.