TOPICS / Vulnerability Management
Vulnerability Management
Find, prioritize, and remediate vulnerabilities.
There are always more vulnerabilities than time to fix them, so prioritization is everything. CVSS severity, real-world exploitation (CISA KEV), and the underlying weakness type (CWE) together tell you what to patch first.
Look up any CVE, browse what’s actively exploited, and understand the weakness classes behind them.
Free tools
Practice
Latest coverage
- Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign
- CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites
- CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited
- Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection
- Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content
- YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support
- MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware
- JDownloader Site Hacked, Installers Swapped with Python RAT Malware
Key terms
Reference databases