Vulnerability Database

Item

Image Cube25.jpg
Description This lovingly-collected database is filled with hundreds of security vulnerabilities. Most of them are fixable, but any given site will probably have a few left open.
Type Data

Sources

Oldos hacking: Browse hidden files of a software company

Note: The following recipe still exists but one or more ingredients are no longer available.

Correlate the data from two sets of Security Patches
computerchip.jpg
Security Patches Security Patches
= Vulnerability Database

Uses

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License