- Vulnerability databases are used by variety of companies / entities to solidify their defenses in cyber world. Here is a list of vulnerability databases in prime use by various entities that I could find.
- https://nvd.nist.gov/
- https://www.exploit-db.com/
- https://msrc.microsoft.com/
- https://ubuntu.com/security/notices
- https://github.com/advisories
- https://vulners.com/
- https://owasp.org/
- https://www.kb.cert.org/vuls/
- https://www.cisa.gov/
- https://www.cisa.gov/topics/industrial-control-systems
- https://security.snyk.io/
- https://access.redhat.com/security/
- https://cve.mitre.org/
- Email me: Neil@HarwaniSytems.in
- Website: www.HarwaniSystems.in
- Blog: www.TechAndTrain.com/blog
- LinkedIn: Neil Harwani | LinkedIn