Find detailed notes on software vulnerabilities, including technical info, remediation steps, and affected vendors, maintained by the CERT Coordination Center.
Explore up-to-date software vulnerability details
The CERT Vulnerability Notes Database is your go-to resource for detailed information about software security issues. Here, you can browse summaries and technical details of known vulnerabilities, see which vendors are affected, and learn about recommended remediation steps. The site is designed for anyone interested in cybersecurity, from IT professionals to researchers and concerned users.
You can search the database for specific vulnerabilities, read about coordinated disclosure efforts, and even report new vulnerabilities directly through the site. The platform is supported by the Software Engineering Institute and aims to keep you informed and help make digital environments safer. If you want even more data, the site also links to comprehensive archives and related resources.
Discover websites similar to Kb.cert.org based on shared categories, topics, and features.
Learn about Meltdown and Spectre vulnerabilities, their impact on computer security, and access research papers and resources for deeper understanding.
Explore a comprehensive database of common software attack patterns to help identify, understand, and defend against cybersecurity threats.
Read X41 D-Sec's expert white paper comparing the security of Chrome, Edge, and Internet Explorer for enterprise browser protection insights.
Learn how to spot scams and protect yourself online with practical tips and guides focused on keeping Brits safe from phone, SMS, email, and web fraud.
Helps you identify, prevent, and report malicious software and websites to keep your devices and browsing safe from online threats.
MITRE ATT&CK is an open knowledge base of cybersecurity threats, tactics, and techniques, helping you understand and defend against real-world attacks.
Find recommended cryptographic key lengths from top organizations and reports to help you choose secure encryption settings quickly and easily.
Scan and check your website's HTTP security headers for vulnerabilities and get tips to improve your site's security in just a few seconds.
Explore a comprehensive, community-driven list of software and hardware weaknesses to help identify security risks and improve system safety.
Explore a comprehensive database of public exploits, shellcode, and security research for ethical hacking, penetration testing, and cybersecurity learning.