Loginsoft provides SCAP vulnerability management security content and intelligence feeds built for vulnerability scanners, risk platforms, and security operations teams.
Book a Meeting


ABOUT THE SERVICE
Our Security Content Suite delivers vulnerability, patch, and compliance management in SCAP-supported formats (OVAL & XCCDF). With over 40,000+ OVAL definitions, we provide extensive coverage across:
Operating Systems: Windows, Linux, macOS
Networking Devices: Cisco Routers/Switchs, Juniper JUNOS, VMware ESXi
Support for 400+ software products
Extensive coverage for CISA KEV catalog
Continuous expansion of our product coverage to address emerging vulnerabilities and new software releases
Click here to receive our latest Catalogue with list of products we currently support
DownloadOur Capabilities

We ensure your security tools always have the latest intelligence. Our team monitors and updates CVEs daily, with high and critical vulnerabilities addressed within 1 business day, keeping your vulnerability management capabilities ahead of emerging threats.
Our meticulous research ensures precise software identification in complex IT inventories. By analyzing fingerprint patterns across multiple operating systems, we capture each software's unique characteristics for accurate recognition. Our professional research and continuous validation process eliminates false positives, ensuring reliable vulnerability detection across diverse environments.


We provide complete security content for vulnerability management, patch definition, inventory, and compliance. Our unified approach allows security tools to not only detect vulnerabilities but also verify patch status and ensure compliance with industry benchmarks and security standards.
Key Benefits
We prioritize all products in the CISA Known Exploited Vulnerabilities (KEV) catalog, ensuring rapid coverage in our security feed. Our proactive approach delivers 200+ more products than competitors, giving your security solutions the broadest detection capabilities in the market.
Our SCAP content powers industry leaders including Tanium and Arcticwolf. These security pioneers rely on our definitions to drive their vulnerability management capabilities, validating the quality and accuracy of our content.
SCAP vulnerability management is a standardized approach to vulnerability detection and configuration compliance using the Security Content Automation Protocol (SCAP). It uses structured security content formats such as OVAL (Open Vulnerability and Assessment Language) and XCCDF (Extensible Configuration Checklist Description Format) to automate vulnerability scanning, patch validation, and compliance checks.
OVAL definitions are machine-readable security rules used by vulnerability scanners to detect known vulnerabilities. These definitions reference CVE identifiers, software versions, and configuration states to determine whether a system is vulnerable.
OVAL definitions are commonly used in SCAP-compliant vulnerability management platforms.
XCCDF (Extensible Configuration Checklist Description Format) is a SCAP standard used for defining security configuration benchmarks and compliance checks.
Organizations use XCCDF benchmarks to verify system configurations against standards such as:
SCAP content contains the feed for vulnerability management, compliance management and patch management.
Together they enable automated vulnerability scanning and compliance validation through SCAP vulnerability management.
OVAL definitions are consumed by vulnerability scanners and security tools that support SCAP standards. The scanner evaluates system attributes such as software versions, configuration settings, and installed patches against the OVAL rules to determine whether vulnerabilities exist.
The CISA Known Exploited Vulnerabilities (KEV) catalog contains vulnerabilities that are actively exploited in real-world attacks.
Security teams prioritize these vulnerabilities because they represent immediate risk.
SCAP feeds that include KEV coverage help vulnerability management tools detect these high-risk vulnerabilities quickly.
Loginsoft helps you find hidden malicious code in your dependencies and take action.