What is the source for Holm Security’s vulnerability database?

Holm Security use different sources to improve and extend the vulnerability database for network and web application scanning. The main source are public feeds and in addition, a number of different sources are used, which includes tests that our own security researchers add.

To review the vulnerability database click Knowledgebase in the main menu to the right in Security Center.

Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.