Vulnerability Garden: A growing list of 963 named vulnerabilities, attack techniques and exploits
Summary
This article compiles a vast catalog of vulnerabilities, CVEs, and related attack techniques. It serves as a reference for security teams, threat intelligence professionals, and researchers to track historical and contemporary vulnerabilities across software and systems. The list highlights disclosure trends and remediation activity across decades of vulnerability data.