A vulnerability database (VDB) is a system targeted at gathering, preserving, and disseminating information about found computer system security vulnerabilities. The database will customarily explain the recognized vulnerability, evaluate the possible effect on affected systems, and any workarounds or updates to reduce the issue.
The Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
World Laboratory of Bugtraq is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications.
The WLB tolerance does not exclude information on errors in a configuration or other entries of this kind of dangerous operations character. One of the basic foundations of “World Laboratory of Bugtraq” is interaction with users. Each safety note, can be reported, and then verified by the CXSecurity.
Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
Chinese government-run vulnerability database analoguous to the United States’s CVE database hosted by Mitre Corporation.
CVE Program is to identify, define, and catalog publicly revealed cybersecurity vulnerabilities. There is CVE Record for each vulnerability and vulnerabilities are discovered then assigned and published by organizations from around the world. Partners issue CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to guarantee they are conversing the similar issue and address the vulnerabilities.Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
The Exploit Database is maintained by Offensive Security, an information security training business that provides various Information Security Certifications as well as penetration testing services. The Exploit Database is a non-profit project hosting exploits for software vulnerabilities.
A public, vendor-neutral forum for comprehensive conversation of vulnerabilities and exploitation techniques, as well as tools, papers, events, and news of interest to the public. The relaxed atmosphere of this individual list provides some funny relief and certain industry gossip. Additional importantly, renewed vulnerabilities sometimes hit this list numerous hours or days before they pass through the Bugtraq moderation queue.
Public vulnerability advisories published or affecting codebases hosted by GitHub, including variuos open source projects.
Hasso-Plattner Institute-VDB portal is the result of research work led by IT-Security Engineering Team. It is a complete and up-to-date repository which contains a huge number of known vulnerabilities of Software. The vulnerability information being collected from Internet is assessed, normalized, and centralized in the high-performance database.
Exploit marketplace and vulnerability information aggregator. (Onion service (http://mvfjfugdwgc5uwho.onion/).)
Archive and announcements of security advisories impacting Microsoft software, published by the Microsoft Security Response Center (MSRC).
Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
United States government’s National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
Open-Source Vulnerability is a vulnerability database and triage infrastructure for open source projects designed at helping both open source maintainers and clients of open source. Currently, this contains vulnerabilities from GitHub OSS-Fuzz (mostly C/C++)
Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.
Read Also:  Top 30 Free Stock images Websites
Packet Storm delivers around-the-clock information and tools in order to assist mitigate both personal data and financial loss on a global scale. Packet Storm releases everything immediately through its RSS feeds, Twitter, and Facebook. Packet Storm site is referenced in over a hundred books and has a history of being highlighted in the news.
SecuriTeam is a small group within Beyond Security dedicated to bringing you the latest news and utilities in computer security. Security Portal” Independent source of software vulnerability information and central Security web site containing all the newest security information from various mailing lists, hacker channels and knowledge.
Snyk vulnerability DB is unique combination of developer-first tooling and tremendous in class security depth enables businesses to easily build security into continuous development process. Detailed information and remediation procedures for vulnerabilities known by Snyk.
The Vulnerability Notes Database provides technical details, remediation information, information about software vulnerabilities aggregated by the United States Computer Emergency Response Team (US-CERT). Vulnerability notes also include summaries lists of affected vendors. Most vulnerability notes are the output of private coordination and disclosure efforts.
The official Vulnerability Laboratory (Vulnerability Lab) supports with the world’s first independent bug bounty hacker community, organized by category of exploit target.. Control skills and creativity to surface critical vulnerabilities before hackers can exploit them. The famous Vulnerability Laboratory platform seamlessly tracks all reports, organizes team and helps to coordinate an effective response
Security database of software vulnerabilities.
Read Also: How To Bypass Mega.nz 50GB Import Limit
Vulmon is a vulnerability search engine with vulnerability intellect features. Vulmon conducts complete text search in its database; so can search all associated to vulnerabilities. It includes CVE ID, vulnerability types, exploits, products, vendors, operating systems and everything else related to vulnerabilities.
Bug bounty program with openly accessible collection of published security advisories, operated by TippingPoint. All security vulnerabilities that are acquired by the Zero Day Initiative are handled conferring to the ZDI Disclosure Policy. After the affected vendor patches the vulnerability, they publish an associated security advisory which describes the issue, including links to the vendor’s fixes.