What is the source for Holm Security’s vulnerability database?

Holm Security use different sources to improve and extend the vulnerability database for network and web application scanning. To review the vulnerability database click Knowledgebase in the main menu to the right in Security Center.

Open source

The main source are public feeds from the open source world. This is very powerful and efficient because experts from the entire world contributes.

Commercial

Tests for specific systems and web applications from commercial sources.

Self-developed

Tests that our own team of test script developers and security researchers create.

Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.