VulnerabilityOriginally, vulnerability reports, advisories and exploits posted in various security lists enter the database as a new entry. The new entry contains only a title and links to entries of the same vulnerability in other security lists. However, at this stage the page for the new entry doesn't contain any detailed description of the vulnerability. After the new entries are thoroughly scrutinized, analyzed and refined, descriptions of the vulnerability, its solutions and test notes are added. Then these details are reviewed by other members of '''OSVDB''', further refined if necessary and then made stable. Once it is stable, the detailed information appears on the page for the entry.
As of January, 2012, vulnerability entry was performed by full time employees of the OSF. Every new entry included title, description, solution (if known), classification data, references, products, and creditee.