CVE
CVE: Introduction
CVE is a FREE service. It contains information on publicly disclosed Cybersecurity vulnerabilities based on data from the CVE® Program, please see the official CVE website and CVE List V5 on GitHub. CVE entry CVE searchFew readersCVE: Entry
Metadata shows the Assigner of this CVE from the List of Partners. The *Description *is shown in all available languages. (usually only in English) The score of the latest version of the CVSS. CVSS scores are shown in all available versions, please see NIST NVD Vulnerability Metrics for details on versions and CVSS in general. (https://storage.crisp.chat/users/helpdesk/website/Few readersCVE: Search
Few readersCVE: RSS feeds
We provide the following RSS feeds for the latest entries on: New: newly published CVEs Updated: CVE entries that were updated KEV: Known Exploited Vulnerabilities Catalog provided by CISA as the authoritative source of vulnerabilities that have been exploited in the wild.Few readers
DNSBL
DNSBL: Delisting
THREATINT DNSBL is a database of IP addresses from which we recommend not to accept email. IP Addresses listed are known to conduct malicious activities including but not limited to sending spam and scanning hosts. Mail server operators may query our list before deciding to accept email from your mail server. If you find your mail server listed on our DNSBL, please follow these steps to get delisted: Make sure that you are are actually testing the IP address of your mail server, not some raPopularDNSBL: Private networks and Link-local addresses
All private networks like 10.0.0.0/8 , 192.168.0.0/16, and fd00::/8 are listed on our DNSBL. The same goes for Link-local addresses like 169.254.0.0/16 or fe80::/10. These addresses are not routeable on the internet, so they cannot be used to send emails to public mail servers. There is no sense in testing these addresses against any DNSBL. If you find yourself doing that, you are probably looking at the LAN-side of your network. Please try the WAN address of your network.Some readers