An exploit search engine

The site is amongst the key exploit databases available, specifically with its capability of cross referencing/correlating exploits and vulnerability data from various sources. Unlike other exploit search engines that are simply custom Google searches, this site actually crawls the source databases/websites and parses the contained data. Once the data is collected and parsed, it is inserted into the database and becomes available for searching.

Takeaway: Before purchasing and deploying a commercial or freeware application, find out whether the vendor is using any open source products within their application. And then verify that the bundled application is free of currently available exploits.