US and Australian agencies warn MongoBleed vulnerability in MongoDB is under active exploitation - SiliconANGLE ...
A critical MongoDB vulnerability allows unauthenticated access to databases, raising urgent security risks for exposed ...
Hackers are exploiting CVE-2025-14847, aka MongoBleed, a MongoDB vulnerability, to leak sensitive information from server ...
Researcher Ryan Dewhurst released the WPScan Vulnerability Database, a database housing security vulnerabilities in WordPress core code, plug-ins and themes. It’s available for pen-testers, WordPress ...
You didn't think you'd get to enjoy your time off without a major cybersecurity incident, did you? A high-severity MongoDB Server vulnerability, for which proofs of concept emerged over Christmas week ...
Get the latest federal technology news delivered to your inbox. Despite goals set last year by the National Institute of Standards and Technology to process a backlog of unanalyzed cybersecurity ...
The National Vulnerability Database (NVD) flagged Bitcoin’s inscriptions as a cybersecurity risk on Dec. 9, calling attention to the security flaw that enabled the development of the Ordinals Protocol ...
A group of volunteer security professionals has compiled what is likely one of the larger freely accessible vulnerability databases on the Internet. The OSVDB (Open Source Vulnerability Database) is ...
Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like the one that ...
An online search engine for the CVE vulnerabilities database. Users may select from any combination of vendor, product, vulnerability source, type or consequence to generate a list of documented ...
Vulnerability databases are platforms that collect, maintain and share information about software and system vulnerabilities. These databases can be public or private and are often maintained by ...
The Open Source Vulnerability Database (OSVDB), which was developed to catalog and describe the Internet’s security vulnerabilities, has opened for public use. Created by members of the security ...