Knowledge Base
VulDB ist mit mehr als 315000 Einträgen die Nummer 1 der Verwundbarkeitsdatenbanken weltweit. Unsere Spezialisten dokumentieren zusammen mit der Community tagtäglich die neuesten Schwachstellen seit 1970. Diese werden in verschiedenen Sprachen beschrieben, kategorisiert und mit zusätzlichen Informationen bereichert. Dadurch kann ein professionelles Vulnerability und Threat Management gewährleistet werden. Administratoren und Sicherheitsexperten können so auf einen Fundus an Informationen zurückgreifen, um Schwachstellen verstehen und adressieren zu können.
📌 Most important articles are pinned
A
- A.I.
- ADP
- ANID
- API
- API Credits📌
- API Fields
- API Key
- API Requests
- ATT&CK
- About📌
- Abuse
- Account Number
- Account Sharing
- Accountability
- Accounts
- Activity Benefits
- Activity Index
- Activity Scores
- Address
- Advance Payment
- Advanced User
- Alerting
- Alexa Skill
- Amazon Echo
- Ancient Vulnerability Data
- Anonymous User
- Archive
- Artificial Intelligence
- Attack Identification
- Authorized Data Publisher
- Automation
- Availability
- Awards
B
C
- C3BM
- CCPA
- CERT
- CH
- CISA
- CISA Funding Problems
- CISA KEV
- CNA📌
- CNA Rules
- CNA Story
- COOP
- CPE📌
- CRA
- CSV
- CTI
- CTI API
- CVE
- CVE Cooperation
- CVE Coverage
- CVE Dispute
- CVE Funding Problems
- CVE Numbering Authority
- CVE Rejected
- CVE Reserved
- CVE Revoked
- CVMAP
- CVSS
- CVSS Confidence
- CVSSv3 Base Meta Index
- California Consumer Privacy Act
- Certainty
- Certifications
- Certified Vulnerability Manager
- Certified Vulnerability Researcher
- Challenge Entry
- Change Index
- Change Pointer
- Changelog📌
- Changes
- Chargeback
- Child Labor
- Code of Conduct
- Collaborative Vulnerability Metadata Acceptance Process
- Commercial Register
- Commercial Software
- Commit Confidence
- Commits
- Common Platform Enumeration
- Common Vulnerabilities and Exposures
- Common Vulnerability Scoring System📌
- Community
- Community Support
- Company History
- Competent User
- Confidence
- Consumer Key
- Contact
- Continuity of Operations Planning
- Contract Basis
- Coordinated Disclosure
- Cortana
- Cost
- Countermeasures
- Coverage📌
- Credit Card
- Crisis Management
- Critical Infrastructure
- Criticality
- Custom Alerts
- Custom Filter
- Custom Notification
- Cyber Defense Agency
- Cyber Resilience Act
- Cyber Threat Intelligence📌
D
- DORA
- DRP
- DSGVO
- Darknet Monitoring
- Data Feed
- Data Points📌
- Data Privacy Notice
- Data Protection
- Data Revocation
- Data Suppression
- Datenschutz-Grundverordnung
- Defunct Source
- Delete Entry
- Demo
- Deny
- Depublished Products
- Digital Operational Resilience Act
- Disaster Recovery
- Discounts
- Display Problems
- Dispute
- Distribution Handling
- Duplicates
E
- EOL
- EPSS
- EU Cyber Resilience Act
- Early Vulnerabilities
- Easiest Vendor to Work with
- Embargo Policy
- Employees
- End-of-Life
- End-of-Service
- European Cyber Resilience Act
- Evaluation📌
- Excel
- Expert
- Exploit Prediction Scoring System
- Exploit Prices
- Exploitability📌
- Exploited in-the-wild
- Export
- Exposure
- Exposure Management
- Extended Work
F
G
H
I
- IBAN
- ICS
- ICSMA
- ILO
- IOA
- IOC
- ISMS
- ISO 27001
- ISO 27002
- ISO 27017
- ISO 29147
- ISO Coverage
- ISOC
- Identifier Collision
- Inaccurate Data
- Index Location
- Indicator of Attack
- Indicator of Compromise
- Information Security Management System
- Information Security Operations Center
- Infrastructure Security
- Internal Testing
- Invoice Data
- Invoicing
J
L
M
- MITRE
- MITRE Cooperation
- MITRE Funding Problems
- MTPD
- MWST
- MWST
- Made in Switzerland
- Mail Alert
- Mark::Zero
- Market Analysis
- Master
- Maternity Leave
- Maximum Tolerable Period of Disruption
- Medium
- Mehrwertsteuer
- Mehrwertsteuer
- Merging
- Minimum Runtime
- Mitigations
- Moderation
- Moderation Confidence
- Most Professional Vendor
- Multiple Users
- MyFilter
N
O
P
- PCI DSS
- PO
- POC
- PVTS
- Package Handling
- Passive User
- Patch
- Pay
- Payment Data
- Payment Due Date
- Payment Methods
- Payout Price
- Plan
- Pointer Position
- Points
- Pre-defined Filter
- Predictions
- Prepayment
- Pricing
- Prior to X
- Prioritize
- Priority Metrics
- Privacy Law
- Privacy Legislation
- Private Vulnerability Tracking System
- Processing📌
- Product Dictionary
- Product Filter
- Product Identifier
- Proficient User
- Proof of Concept
- Purchase
- Purchase Order
- Purl
- Pyxyp
R
S
- SAP Business Network
- SLA
- SOC Connectivity
- Security Bug
- Security Issue
- Security Operations Center
- Semantic Versioning
- Senior Expert
- Senior Master
- Service History
- Service Level Agreement
- Shareware
- Siri
- Slavery Act
- Smart Home
- Social Media
- Software License
- Software Version
- Solutions
- Sources📌
- Sovereignty
- Splitting
- Splunk App
- Splunk Index
- Splunk Pointer
- Standards
- Statements
- Statistical Data
- Stripe
- Structured Data
- Submission Policy📌
- Subscription📌
- Superguru
- Supplier Onboarding
- Support
- Swissness
- Switzerland
T
U
V
- VAT
- VCVC
- VCVM
- VCVR
- Value-added Tax
- Vendor Dictionary
- Vendor Identifier
- Vendor Onboarding
- Version Handling
- Video Tutorials
- Virtual Fields
- Voluntary Work
- VulDB
- VulnDB
- Vulnerability📌
- Vulnerability API
- Vulnerability Alert
- Vulnerability Data Feed
- Vulnerability Disclosure
- Vulnerability Entry Confidence
- Vulnerability Historian
- Vulnerability Management
- Vulnerability Moderation
- Vulnerability Notification
- Vulnerability Prioritization
- Vulnerability Processing
- Vulnerability Revocation
- Vulnerablity Dispute