Tag: CVE
-
WinRAR zero day exploited by RomCom hackers in targeted attacks
ESET researchers have discovered a previously unknown vulnerability in WinRAR, exploited in the wild by Russia-aligned group RomCom. If you …
-
Why we must go beyond tooling and CVEs to illuminate security blind spots
In April, the cybersecurity community held its breath as the Common Vulnerabilities and Exposures (CVE) program was plunged into a moment …
-
CVE-2025-53367: An exploitable out-of-bounds write in DjVuLibre
DjVuLibre has a vulnerability that could enable an attacker to gain code execution on a Linux Desktop system when the user tries to open a …
-
CVE Program Launches Two New Forums to Enhance CVE Utilization
The Board of the Common Vulnerabilities and Exposures (CVE) Program has launched two new forums to encourage more contributions and shape …
-
Linux Users Urged to Patch Critical Sudo CVE
Security researchers have discovered a critical elevation of privilege (EoP) vulnerability in a popular Linux utility, and another that has …
-
GitHub Advisory Database by the numbers: Known security vulnerabilities and what you can do about them
The GitHub Advisory Database (Advisory DB) is a vital resource for developers, providing a comprehensive list of known security …
-
Dems demand audit of CVE program as Federal funding remains uncertain
A pair of Congressional Democrats have demanded a review of the Common Vulnerabilities and Exposures (CVE) program amid uncertainties about …
-
European Vulnerability Database debuts amid CVE shakeup
The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), an interconnected source of …
-
INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense
INE Security, a global leader in hands-on cybersecurity training and certifications, today highlighted how ongoing real-world practice with …
-
European Vulnerability Database Launches Amid US CVE Chaos
Europe’s cybersecurity agency today announced the official launch of a new vulnerability database initiative, which could be useful for …
-
SonicWall customers confront resurgence of actively exploited vulnerabilities
Vulnerabilities are proliferating in SonicWall devices and software this year, putting the vendor’s customers at risk of intrusion via …
-
Beyond Vulnerability Management – Can You CVE What I CVE?
The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security …
●●●