Vulnerability Database

Item

Image Cube25.jpg
Description This lovingly-collected database is filled with hundreds of security vulnerabilities. Most of them are fixable, but any given site will probably have a few left open.
Type Data

Sources

Browse hidden files of an oldos software company

Correlate the data from two sets of Security Patches
computerchip.jpg
Security Patches Security Patches
= Vulnerability Database

Uses

Implement your Vulnerability Database with a File Interface
computerchip.jpg
Vulnerability Database File Interface
= Code Injector
Expand your File Scan to use a Vulnerability Database
computerchip.jpg
File Scan Vulnerability Database
= Deep File Scan
Connect your Network Interpreter with a Vulnerability Database
computerchip.jpg
Network Interpreter Vulnerability Database
= Eavesdropping Tools
Create a Target Search utilizing a Vulnerability Database
computerchip.jpg
Target Search Vulnerability Database
= Intrusive Search
Tune a Software Firewall with a Vulnerability Database
Quest Recipe: Learn recipe from browsing hidden files in a software company
computerchip.jpg
Software Firewall Vulnerability Database
= The Tar Pit
Implement your Vulnerability Database with some Networking Code
computerchip.jpg
Vulnerability Database Networking Code
= Vulnerability Tester
computerchip.jpg security patches
GoldCoins.jpg This item can be discarded via the gang stash.
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License