About 12,900 results
Open links in new tab
  1. Known Exploited Vulnerabilities Catalog - CISA

    This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication.

  2. Coordinated Vulnerability Disclosure Program - CISA

    This document recommends guidance for establishing a federal vulnerability disclosure framework, properly handling vulnerability reports, and communicating the mitigation and/or …

  3. Ransomware Vulnerability Warning Pilot (RVWP) - CISA

    As required by CIRCIA, CISA proactively identifies information systems that contain security vulnerabilities commonly associated with ransomware attacks. After discovery, CISA notifies …

  4. Vulnerability Disclosure Policy (VDP) Platform - CISA

    CISA’s VDP Platform helps agencies streamline day-to-day operations when disclosing and managing cyber vulnerabilities. The platform serves as the primary point of entry for receiving, …

  5. Cybersecurity Alerts & Advisories - CISA

    Dec 22, 2025 · Alerts typically include information on newly exploited or disclosed vulnerabilities, newly discovered cyber threat campaigns, severe denial-of-service events or widespread …

  6. Top Routinely Exploited Vulnerabilities - CISA

    Aug 20, 2021 · This advisory provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—routinely exploited by malicious cyber actors in 2020 …

  7. Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

    Feb 12, 2025 · Software manufacturers must prioritize customer security by eliminating buffer overflow vulnerabilities. Key investments include providing secure building blocks for …

  8. Vulnerability Summary for the Week of January 29, 2024 - CISA

    Feb 5, 2024 · The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet …

  9. Vulnerability management requires an organization to understand and assess two specific capabilities: the discovery of vulnerabilities and the analysis of pertinent vulnerabilities.

  10. UPDATE: Microsoft Releases Guidance on Exploitation of ... - CISA

    Aug 6, 2025 · CISA encourages organizations to review all articles and security updates published by Microsoft on July 8, 2025, relevant to the SharePoint platform deployed in their environment.