About 114,000 results
Open links in new tab
  1. Nov 12, 2024 · CVE-2023-27997: This vulnerability affects Fortinet FortiOS and FortiProxy SSL-VPN. Allows a remote user to craft specific requests to execute arbitrary code or commands.

  2. Remediation is an action to correct known deficiencies and avoid the effects an exploited vulnerability could cause. We considered the DON’s documented determination to accept the …

  3. National Vulnerability Database (NVD) The NVD is the USG repository of standards-based vulnerability management data represented using the Security Content Automation Protocol …

  4. Report No. DODIG-2025-071: (U) Audit of Cyber Vulnerabilities …

    Feb 25, 2025 · Audit of Cyber Vulnerabilities Impacting Defense Critical Infra tructure January 31, 2025

  5. A vulnerability is a “weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.”4

  6. Jun 23, 2025 · MSLs offer the most comprehensive mitigation against this pervasive and dangerous class of vulnerability. Adopting MSLs can accelerate modern software development …

  7. Jan 21, 2020 · Each section below presents a cloud vulnerability class, provides real world examples, estimates vulnerability prevalence, assesses attacker sophistication, and discusses …

  8. Executive summary As organizations continue to migrate to using cloud environments, these environments are becoming increasingly valuable targets for malicious cyber actors (MCA). …

  9. Aug 3, 2023 · The vulnerability, which was likely initially exploited as a zero-day before public disclosure in June 2022, is related to an older Confluence vulnerability (CVE-2021-26084), …

  10. RA.L2-3.11.2 Vulnerability Scan Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, …