Researcher Ryan Dewhurst released the WPScan Vulnerability Database, a database housing security vulnerabilities in WordPress core code, plug-ins and themes. It’s available for pen-testers, WordPress ...
Vulnerability submissions increased 32% in 2024, NIST said. The agency is considering machine learning to automate certain vulnerability analysis tasks. Despite goals set last year by the National ...
Morning Overview on MSN
Hackers are now exploiting vulnerabilities 7 days before patches exist — and hand off access in 22 seconds, Mandiant warns
A vulnerability tracked as CVE-2025-53770 and referred to as ToolShell is already being used against real targets, and the ...
Juhan Lepassaar, Executive Director at ENISA. Image: Hubert Burda Media/Flickr The announcement comes after concerns that the US government would stop funding the operations of MITRE, the nonprofit ...
Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like the one that ...
The National Vulnerability Database (NVD) is well known in IT security as the source of record for all vulnerabilities which have been assigned a CVE (Common Vulnerabilities and Exposures) enumeration ...
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and actionable” information on newly disclosed cyber ...
There's a new vulnerability database in town, and experts differ on how much its presence is going to affect the bug-tracking landscape. The European Union's cyber agency, ENISA, on May 13 launched ...
Morning Overview on MSN
Microsoft patches GitHub’s worst vulnerability in years within two hours of disclosure — no exploitation found
A critical remote code execution flaw in GitHub was patched by Microsoft in roughly two hours after public disclosure, ...
An online search engine for the CVE vulnerabilities database. Users may select from any combination of vendor, product, vulnerability source, type or consequence to generate a list of documented ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results