About 12,900 results
Open links in new tab
  1. Known Exploited Vulnerabilities Catalog - CISA

    This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication.

  2. Cybersecurity Alerts & Advisories | CISA

    Dec 19, 2025 · Alerts typically include information on newly exploited or disclosed vulnerabilities, newly discovered cyber threat campaigns, severe denial-of-service events or widespread outages, or …

  3. Coordinated Vulnerability Disclosure Program - CISA

    This document recommends guidance for establishing a federal vulnerability disclosure framework, properly handling vulnerability reports, and communicating the mitigation and/or remediation of …

  4. Ransomware Vulnerability Warning Pilot (RVWP) - CISA

    As required by CIRCIA, CISA proactively identifies information systems that contain security vulnerabilities commonly associated with ransomware attacks. After discovery, CISA notifies owners …

  5. Vulnerability Disclosure Policy (VDP) Platform - CISA

    CISA’s VDP Platform helps agencies streamline day-to-day operations when disclosing and managing cyber vulnerabilities. The platform serves as the primary point of entry for receiving, triaging, and …

  6. UPDATE: Microsoft Releases Guidance on Exploitation of ... - CISA

    Aug 6, 2025 · CISA encourages organizations to review all articles and security updates published by Microsoft on July 8, 2025, relevant to the SharePoint platform deployed in their environment.

  7. Top Routinely Exploited Vulnerabilities - CISA

    Aug 20, 2021 · This advisory provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—routinely exploited by malicious cyber actors in 2020 and …

  8. Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities - CISA

    Feb 12, 2025 · Software manufacturers must prioritize customer security by eliminating buffer overflow vulnerabilities. Key investments include providing secure building blocks for developers to prevent …

  9. Vulnerability management requires an organization to understand and assess two specific capabilities: the discovery of vulnerabilities and the analysis of pertinent vulnerabilities.

  10. Vulnerability Summary for the Week of January 29, 2024 - CISA

    Feb 5, 2024 · The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have …