• The Open Sourced Vulnerability Database (OSVDB) was an independent and open-sourced vulnerability database. The goal of the project was to provide accurate...
    6 KB (713 words) - 12:22, 6 June 2025
  • Major vulnerability databases such as the ISS X-Force database, Symantec / SecurityFocus BID database, and the Open Source Vulnerability Database (OSVDB)...
    17 KB (1,831 words) - 20:16, 25 July 2025
  • Thumbnail for Common Vulnerability Scoring System
    The Common Vulnerability Scoring System (CVSS) is an open framework for rating the severity of security vulnerabilities in computing systems. Scores are...
    35 KB (3,418 words) - 01:11, 30 July 2025
  • ExploitDB (redirect from Exploit Database)
    ExploitDB, sometimes stylized as Exploit Database or Exploit-Database, is a public and open source vulnerability database maintained by Offensive Security. It...
    5 KB (464 words) - 11:32, 13 May 2025
  • Common Vulnerability Scoring System (CVSS) and added to vulnerability databases such as the Common Vulnerabilities and Exposures (CVE) database. As of...
    26 KB (3,333 words) - 22:03, 4 August 2025
  • investigating a vulnerability or potential vulnerability it helps to acquire a CVE number early on. CVE numbers may not appear in the MITRE or NVD databases for some...
    18 KB (2,118 words) - 00:37, 16 July 2025
  • MyAnimeList MySql Names Database NNDB Omniglot On-Line Encyclopedia of Integer Sequences Open Source Vulnerability Database Paradisec PHI-base Philosophy...
    6 KB (485 words) - 01:55, 5 August 2025
  • Thumbnail for Free and open-source software
    Free and open-source software (FOSS) is software available under a license that grants users the right to use, modify, and distribute the software – modified...
    89 KB (7,586 words) - 20:09, 4 August 2025
  • Nikto (vulnerability scanner) – Web server vulnerability scanner Nmap – Network scanning, Port scanner, and auditing tool. OpenSSH – Open-source implementation...
    79 KB (5,811 words) - 22:59, 5 August 2025
  • Thumbnail for HTTP response splitting
    Open Source Vulnerability Database. Retrieved 2024-01-16. "CVE-2015-5144 | Snyk Vulnerability Database". Learn more about pip with Snyk Open Source Vulnerability...
    3 KB (352 words) - 02:34, 8 January 2025
  • Thumbnail for Open-source software
    Open-source software (OSS) is computer software that is released under a license in which the copyright holder grants users the rights to use, study,...
    77 KB (9,435 words) - 17:27, 5 August 2025
  • Thumbnail for Google
    Google (redirect from Google Open Source)
    tool for finding security holes in open source software, which pulls from the largest open source vulnerability database of its kind to defend against supply...
    266 KB (22,203 words) - 03:16, 2 August 2025
  • OSF managed several projects including the Open Source Vulnerability Database (OSVDB), Data Loss Database (DatalossDB), and Cloutage. The OSF was established...
    3 KB (257 words) - 00:04, 11 May 2025
  • The approach of vulnerability in itself brings great expectations of social policy and gerontological planning. Types of vulnerability include social,...
    25 KB (3,189 words) - 18:30, 23 May 2025
  • Thumbnail for SQL injection
    SQL injection (category CS1 Polish-language sources (pl))
    sensitive data. The Open Web Application Security Project (OWASP) describes it as a vulnerability that occurs when applications construct database queries using...
    47 KB (4,983 words) - 12:15, 18 July 2025
  • Metasploit (redirect from Opcode Database)
    such as Nmap. Vulnerability scanners such as Nessus, and OpenVAS can detect target system vulnerabilities. Metasploit can import vulnerability scanner data...
    17 KB (1,623 words) - 19:04, 20 July 2025
  • tracked in the National Vulnerability Database (NVD). Some products use an additional proprietary database of vulnerabilities. For IP / Legal Compliance...
    15 KB (1,661 words) - 07:37, 31 May 2025
  • most vulnerable after a potential vulnerability is discovered, but before a patch is created. By measuring the number of days between the vulnerability and...
    8 KB (1,027 words) - 06:32, 1 March 2025
  • to 7.1 of the OpenSSH client, and was fixed in OpenSSH 7.1p2, released on 14 January 2016. CVE numbers associated to this vulnerability are CVE-2016-0777...
    26 KB (2,781 words) - 11:28, 8 July 2025
  • Thumbnail for Heartbleed
    an openssl security vulnerability, which is/was very noisy. So sorry!" (Tweet) – via Twitter. "Security: Heartbleed vulnerability". GitHub. 8 April 2014...
    118 KB (9,768 words) - 01:15, 1 August 2025
  • Thumbnail for OpenOffice.org
    OpenOffice.org is a discontinued open-source office productivity software suite. It originated from the proprietary StarOffice, developed by Star Division...
    144 KB (11,160 words) - 20:44, 13 July 2025
  • Log4Shell (category CS1 German-language sources (de))
    zero-day vulnerability reported in November 2021 in Log4j, a popular Java logging framework, involving arbitrary code execution. The vulnerability had existed...
    36 KB (3,505 words) - 23:26, 31 July 2025
  • non-persistent (or reflected) cross-site scripting vulnerability is by far the most basic type of web vulnerability. These holes show up when the data provided...
    31 KB (3,614 words) - 06:10, 28 July 2025
  • Thumbnail for Jira (software)
    The full source code is available for its users to modify under a developer source license. In April 2010, a cross-site scripting vulnerability in Jira...
    10 KB (850 words) - 18:16, 5 August 2025
  • better against open source alternatives, and acquired Sun Microsystems, owner of MySQL, in 2010. Database products licensed as open-source are, by the legal...
    27 KB (1,619 words) - 10:42, 7 June 2025
  • Free and open-source software portal Lightning Memory-Mapped Database (LMDB) is an embedded transactional database in the form of a key-value store. LMDB...
    31 KB (3,314 words) - 01:41, 21 June 2025
  • Thumbnail for Wiz, Inc.
    gain access to other customers' databases after bypassing authentication. AttachMe – A cloud isolation vulnerability that, before it was patched by Oracle...
    17 KB (1,492 words) - 19:42, 28 June 2025
  • vulnerability that allowed attackers to execute arbitrary code with the privileges of the SSH daemon, typically root. In January 2001 a vulnerability...
    41 KB (4,510 words) - 20:00, 4 August 2025
  • Thumbnail for OpenSSL
    is a security bypass vulnerability that results from a weakness in OpenSSL methods used for keying material. This vulnerability can be exploited through...
    65 KB (5,549 words) - 18:39, 27 July 2025
  • The Windows Metafile vulnerability—also called the Metafile Image Code Execution and abbreviated MICE—is a security vulnerability in the way some versions...
    23 KB (2,567 words) - 00:40, 4 August 2025