Business-grade email server software SmarterMail just patched a maximum-severity vulnerability that allowed threat actors to ...
Hackers are exploiting CVE-2025-14847, aka MongoBleed, a MongoDB vulnerability, to leak sensitive information from server ...
Get the latest federal technology news delivered to your inbox. Despite goals set last year by the National Institute of Standards and Technology to process a backlog of unanalyzed cybersecurity ...
A critical MongoDB vulnerability allows unauthenticated access to databases, raising urgent security risks for exposed ...
A severe vulnerability affecting multiple MongoDB versions, dubbed MongoBleed (CVE-2025-14847), is being actively exploited ...
Researcher Ryan Dewhurst released the WPScan Vulnerability Database, a database housing security vulnerabilities in WordPress core code, plug-ins and themes. It’s available for pen-testers, WordPress ...
A group of volunteer security professionals has compiled what is likely one of the larger freely accessible vulnerability databases on the Internet. The OSVDB (Open Source Vulnerability Database) is ...
Vulnerability databases are platforms that collect, maintain and share information about software and system vulnerabilities. These databases can be public or private and are often maintained by ...
The National Vulnerability Database (NVD) flagged Bitcoin’s inscriptions as a cybersecurity risk on Dec. 9, calling attention to the security flaw that enabled the development of the Ordinals Protocol ...
The Open Source Vulnerability Database (OSVDB), which was developed to catalog and describe the Internet’s security vulnerabilities, has opened for public use. Created by members of the security ...
Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like the one that ...
An online search engine for the CVE vulnerabilities database. Users may select from any combination of vendor, product, vulnerability source, type or consequence to generate a list of documented ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results