https://blog.osvdb.org/
|
The Open Source Vulnerability Database
|
http://www.securityfocus.com/
|
Public vulnerabilities, mailing lists, and security tools
|
http://www.packetstormsecurity.org/
|
Exploits, advisories, tools, and whitepapers
|
http://www.secunia.com/
|
Advisories, whitepapers, security factsheets, and research papers
|
http://www.exploit-db.com/
|
Exploits database, Google Hacking Database (GHDB), and papers
|
http://web.nvd.nist.gov/view/vuln/search
|
NVD is a U.S. government repository for a vulnerability database based on CVE
|
https://access.redhat.com/security/updates/advisory/
|
RedHat errata notification and security advisories
|
http://lists.centos.org/pipermail/centos-announce/
|
CentOS security and general announcement mailing list
|
http://www.us-cert.gov/ncas/alerts
|
DHS US-CERT reports security issues, vulnerabilities, and exploits technical alerts
|
https://exchange.xforce.ibmcloud.com/
|
IBM X-Force offers security threat alerts, advisories, vulnerability database, and whitepapers
|
http://www.debian.org/security/
|
Debian security advisories and mailing lists
|
https://www.suse.com/support/update/
|
SUSE Linux Enterprise security advisories
|
http://technet.microsoft.com/en-us/security/advisory
|
Microsoft security advisories
|
http://technet.microsoft.com/en-us/security/bulletin
|
Microsoft security bulletins
|
http://www.ubuntu.com/usn
|
Ubuntu security notices
|
http://www.first.org/cvss/
|
First Common Vulnerability Scoring System (CVSS-SIG)
|
http://tools.cisco.com/security/center/publicationListing.x
|
Cisco security advisories, responses, and notices.
|
http://www.security-database.com
|
Security alerts and dashboard, and CVSS calculator.
|
http://www.securitytracker.com/
|
Security vulnerabilities information.
|
http://www.auscert.org.au/
|
Australian CERT publishes security bulletins, advisories, alerts, presentations, and papers.
|
http://en.securitylab.ru/
|
Advisories, vulnerability database, PoC, and virus reports.
|
https://www.coresecurity.com/grid/advisories
|
Vulnerability research, publications, advisories, and tools.
|
https://www.htbridge.com/
|
Security advisories and security publications.
|
http://www.offensivecomputing.net/
|
Malware sample repository.
|
http://measurablesecurity.mitre.org/
|
MITRE offers standardized protocols for the communication of security data related to vulnerability management, intrusion detection, asset security assessment, asset management, configuration guidance, patch management, malware response, incident management, and threat analysis. Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), Common Attack Pattern Enumeration and Classification (CAPEC), and Common Configuration Enumeration (CCE) are a few of them.
|