Documentación
La base de datos de vulnerabilidad número 1 en todo el mundo con más de 283000 entradas. Nuestros especialistas documentan los últimos problemas de seguridad desde 1970.
📌 Most important articles are pinned
A
- A.I.
- ADP
- ANID
- API
- API Credits📌
- API Fields
- API Key
- API Requests
- ATT&CK
- About📌
- Abuse
- Account Number
- Account Sharing
- Accounts
- Activity Benefits
- Activity Index
- Activity Scores
- Address
- Advanced User
- Alerting
- Alexa Skill
- Amazon Echo
- Anonymous User
- Archive
- Artificial Intelligence
- Attack Identification
- Authorized Data Publisher
- Automation
- Availability
B
C
- C3BM
- CCPA
- CERT
- CH
- CISA
- CISA KEV
- CNA📌
- CNA Rules
- CNA Story
- COOP
- CPE📌
- CRA
- CSV
- CTI
- CTI API
- CVE
- CVE Cooperation
- CVE Coverage
- CVE Dispute
- CVE Numbering Authority
- CVE Rejected
- CVE Reserved
- CVE Revoked
- CVMAP
- CVSS📌
- CVSS Confidence
- CVSSv3 Base Meta Index
- California Consumer Privacy Act
- Certainty
- Challenge Entry
- Change Index
- Change Pointer
- Changelog📌
- Changes
- Chargeback
- Child Labor
- Code of Conduct
- Collaborative Vulnerability Metadata Acceptance Process
- Commercial Register
- Commercial Software
- Commit Confidence
- Commits
- Common Platform Enumeration
- Common Vulnerabilities and Exposures
- Common Vulnerability Scoring System
- Community
- Community Support
- Company History
- Competent User
- Confidence
- Consumer Key
- Contact
- Continuity of Operations Planning
- Contract Basis
- Coordinated Disclosure
- Cortana
- Cost
- Countermeasures
- Coverage📌
- Credit Card
- Crisis Management
- Critical Infrastructure
- Criticality
- Custom Alerts
- Custom Filter
- Custom Notification
- Cyber Defense Agency
- Cyber Resilience Act
- Cyber Threat Intelligence📌
D
- DORA
- DRP
- DSGVO
- Darknet Monitoring
- Data Feed
- Data Points📌
- Data Privacy Notice
- Data Protection
- Data Revocation
- Data Suppression
- Datenschutz-Grundverordnung
- Defunct Source
- Delete Entry
- Demo
- Deny
- Depublished Products
- Digital Operational Resilience Act
- Disaster Recovery
- Discounts
- Display Problems
- Dispute
- Distribution Handling
- Duplicates
E
F
I
- IBAN
- ICS
- ICSMA
- ILO
- IOA
- IOC
- ISMS
- ISO 27001
- ISO 27002
- ISO 27017
- ISO 29147
- ISO Coverage
- ISOC
- Identifier Collision
- Inaccurate Data
- Index Location
- Indicator of Attack
- Indicator of Compromise
- Information Security Management System
- Information Security Operations Center
- Infrastructure Security
- Internal Testing
- Invoice Data
- Invoicing
J
L
M
N
P
- PCI DSS
- PO
- POC
- Package Handling
- Passive User
- Patch
- Pay
- Payment Data
- Payment Methods
- Payout Price
- Plan
- Pointer Position
- Points
- Pre-defined Filter
- Predictions
- Prepayment
- Pricing
- Prior to X
- Prioritize
- Priority Metrics
- Privacy Law
- Privacy Legislation
- Processing📌
- Product Dictionary
- Product Filter
- Product Identifier
- Proficient User
- Proof of Concept
- Purchase
- Purchase Order
- Purl
- Pyxyp
R
S
- SAP Business Network
- SLA
- SOC Connectivity
- Security Bug
- Security Issue
- Security Operations Center
- Semantic Versioning
- Senior Expert
- Senior Master
- Service History
- Service Level Agreement
- Shareware
- Siri
- Slavery Act
- Smart Home
- Social Media
- Software License
- Software Version
- Solutions
- Sources📌
- Sovereignty
- Splitting
- Splunk App
- Splunk Index
- Splunk Pointer
- Standards
- Statements
- Statistical Data
- Stripe
- Structured Data
- Submission Policy📌
- Subscription📌
- Superguru
- Supplier Onboarding
- Support
- Swissness
- Switzerland
T
U
V
- VAT
- Value-added Tax
- Vendor Dictionary
- Vendor Identifier
- Vendor Onboarding
- Version Handling
- Video Tutorials
- Virtual Fields
- Voluntary Work
- VulDB
- VulnDB
- Vulnerability📌
- Vulnerability API
- Vulnerability Alert
- Vulnerability Data Feed
- Vulnerability Disclosure
- Vulnerability Entry Confidence
- Vulnerability Management
- Vulnerability Moderation
- Vulnerability Notification
- Vulnerability Prioritization
- Vulnerability Processing
- Vulnerability Revocation
- Vulnerablity Dispute