The article provides a detailed overview of the most important databases of vulnerabilities and tools for their detection and elimination. It will list the main resources used in the field of cyber security, with a brief description of each tool and a link to their official sites.
Archive of CVE and Bugtraq software vulnerabilities, cross-referenced with the Google dork database.
A public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishing details before many other sources.
Announcements of security issues discovered in Microsoft software are published by the Microsoft Security Response Center (MSRC).
Non-commercial project, hosting exploits for software vulnerabilities, provided as a public service Offensive Security.
Provides additional metadata (CPE, CVSS score) of the standard CVE list along with a fine-grained search engine.
A dictionary of common names (ie, CVE identifiers) for publicly available security vulnerabilities.
Archive of security advisories affecting Mozilla software, including the Firefox web browser.
An open forum for security recommendations organized by target exploit categories.
Bug bounty program with public archive of published security tips, managed by TippingPoint.
A collection of exploits, recommendations, tools, and other security-related resources collected from across the industry.
Summary, technical details, troubleshooting information, and vendor lists affected by software vulnerabilities aggregated by the US Computer Emergency Response Team (US-CERT).