List of Vulnerability Databases
There are a number of vulnerability databases out there. Here’s a list of some/most of the main ones.
- NVD
(https://nvd.nist.gov) - NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
- OSVDB
(http://www.osvdb.org) - OSVDB’s goal is to provide accurate, detailed, current, and unbiased technical security information. The project currently covers 120,980 vulnerabilities, spanning 198,976 products from 4,735 researchers, over 113 years.
- Exploit Database
(https://www.exploit-db.com) - The Exploit Database is maintained by Offensive Security, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by Offensive Security.
- Rapid7 Vulnerability and Exploit Database
(http://www.rapid7.com/db/) - A database of vulnerabilities and Metasploit modules.
- Securityfocus BugTraq (BID) Database
(http://www.securityfocus.com/bid) - The SecurityFocus Vulnerability Database provides security professionals with the most up-to-date information on vulnerabilities for all platforms and services.
- WPScan Vulnerability Database (BID) Database
(https://wpvulndb.com) - A Vulnerability Database for WordPress, its Plugins and Themes.
Vulnerability Database Use Cases
Here are some use cases for the various databases.
- Find details on a particular issue you’ve discovered using a tool
- Search for products you have and see how they’re vulnerable
- Gain a general awareness of how insecure most products are that we use
- Find issues in products that you’re performing authorized security testing for
- Satisfy curiosity
Notes
- Some of these are for different types of security information, i.e. not technically vulnerabilities, but it’s good to have them all in one place regardless of those differences.
- There are a number of other databases out there that are not open to the public, and I have not included them for this reason.
- Let me know if you think I should add any other databases.