The site www.exploitsearch.net is amongst the key exploit databases available, specifically with its capability of cross referencing/correlating exploits and vulnerability data from various sources. Unlike other exploit search engines that are simply custom Google searches, this site actually crawls the source databases/websites and parses the contained data. Once the data is collected and parsed, it is inserted into the database and becomes available for searching. http://alrt.co/YUxWOV
Takeaway: Before purchasing and deploying a commercial or freeware application, find out whether the vendor is using any open source products within their application. And then verify that the bundled application is free of currently available exploits.